Background: To assess the alveolar bone crest level (ABCL) by Cone Beam Computed To-mography (CBCT) and to investigate several variables as predictors for the height of the alveolar bone in adolescents. Materials and methods: Age, sex, and ethnic groups were rec-orded for each patient. CBCT images were used to obtain measurements of the interproximal alveolar bone level from the cementoenamel junction (CEJ) to the alveolar crest. The highest measurement in each sextant was recorded along with any presence of a vertical bone defect or calculus. Results: Total of 720 measurements were recorded for 120 subjects. No vertical bony defects or calculus were observed radiographically. Statistically significant (P< 0.05) differences were observed between ABCL measurements of males as compared to females, posterior teeth compared to anterior teeth and maxillary sextants in comparison to man-dibular ones. Additionally, value of ABCL significantly increased in relation to sex (r=0.309), maxillary posterior (r=0.509) and mandibular posterior sextants (r=0.506). Linear regression analysis indicated that the latter variables can predict the height of marginal bone, other independent variables were considered redundant. Conclusions: There was a low-profile of marginal bone loss among adolescents. Male sex, posterior teeth, and maxillary teeth have higher tendency for decreasing alveolar bone height.
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe present research aimed to test the imagination of children, and may build sample consisted of (400) a baby and child, selected by random way of four Directorates (first Resafe, second Resafe ,first alkarkh , second alkarkh), in order to achieve the objective of research the tow researchers have a test of imagination and extract the virtual and honesty plants distinguish paragraphs and paragraphs and difficulty factor became the test consists of (32), statistical methods were used (Pearson correlation coefficient, coefficient of difficult passages, highlight paragraphs, correlation equation, an equation wrong Standard) the tow researchers have a number of recommendations and proposals.
يهتم هذا البحث بدراسة الأجوبة المسكتة,وهي أجوبة سريعة وحاسمة تقطع حجة الخصم وتفحمه وتغلقالحوار.وقد أرتكز البحث على منهجية تداولية تنظرإلى فاعلية الجواب المسكت في المحاورة وإنهائها من زواياإنجازية و حجاجية.وقد تكون البحث من ديباجة ممهدةوثلاثة مباحث.وسلطتالديباجةالممهدةالضوء علىمفهومالجواب المسكتوشيوعهفي كتب الأدبوالأخبارونوادر الكلاموكيف يمكن النظر لهبوصفه وحدة حوارية تنبنيمنها المحادثة؟أما المبحث ا
... Show MoreSubcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show MoreThe physician's commitment to medical insight is affected by several factors that vary from patient to patient in terms of the nature of the disease, the severity of the disease, the age of the patient, and the purpose of undergoing medical intervention. There are circumstances surrounding patients that require the physician to reduce the insight towards them, by concealing medical information. The physician must firmly commit to expanding the scope of his vision to a wider extent than in normal medical work. Therefore, we will discuss in this regard the cases in which medical explanation is reduced and the cases that require confirmation in the following order.
Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff
... Show MoreOver the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time. In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D
... Show MoreThis paper aims at presenting a comparison between objective and subjective tests . This paper attemptsto shed light on these two aspects of tests and make do a compression by using suitable techniques for objective and subjective tests .
The paper compares between the two techniques used by the objective and subjective tests respectively, the time and efforts required by each type, the extent to which each type can be reliable, and the skills each type is suitable to measure.
The paper shows that objective tests, on the contrary of the subjective ones, encourages guess> Objective tests are used to test specific areas of langua
... Show More