Background: Diagnosis and treatment planning can be difficult with conventional radiographic methods as the orthodontic-surgical management of impacted canines requires accurate diagnosis and precise localization of the impacted canine and the surrounding structures. This study was aimed to localize and evaluate weather there is any differences in the diagnostic information provided by multi-slice computed tomography three dimensional volumetric CT images and two dimensional reconstructed panorama images (derived from CT) in subjects with impacted maxillary canines. Materials and Methods: Thirty patients including 24 female and 6 male with mean age of 18 years with suspected unilaterally or bilaterally impacted maxillary canines were evaluated on images taken with Brilliance™ 64, Philips multi-detector computed tomography. The spatial relationships of the impacted maxillary canines relative to the adjacent structures was evaluated using linear and angular measurements, and the adjacent lateral incisor root resorption was assessed with three dimensional and two dimensional visualization software. Results: The inclination of the impacted maxillary canine measured to the midline and to the occlusal plane did not differ significantly when it was evaluated using the two imaging modalities. However, there were significant differences between the 3D and 2D images with respect to the impacted maxillary canine vertical height, bucco-palatal localization, and in detecting the proximity and root resorption of the adjacent lateral incisors. Conclusion: Dental CT volumetric images provide more reliable and accurate information for diagnosing the maxillary impacted canine position, inclination, distance from adjacent structures, and detection of lateral incisors rootresorption.
The Artificial Neural Network methodology is a very important & new subjects that build's the models for Analyzing, Data Evaluation, Forecasting & Controlling without depending on an old model or classic statistic method that describe the behavior of statistic phenomenon, the methodology works by simulating the data to reach a robust optimum model that represent the statistic phenomenon & we can use the model in any time & states, we used the Box-Jenkins (ARMAX) approach for comparing, in this paper depends on the received power to build a robust model for forecasting, analyzing & controlling in the sod power, the received power come from
... Show More In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm. The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.
Abstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
A description of the implementation of integrated practical work in a remote laboratory was presented in this paper. The student, in real time, can access an online web page in order to manipulate a practical work of digital electronics. This work is based on the use of an embedded system PcDuino. The hardware architecture and software solutions are described, as well as the supervision tool that allows the student to follow changes in the output states of the Practical Work remotely.
In batch experiments, a natural chitosan adsorbent was employed to extract cobalt ions from industrial wastewater under varied parameters of starting concentration, adsorbent weight, pH, and contact duration. The adsorbent was examined using FTIR, XRD, and AFM. For an initial cobalt ion concentration of 5x10-2 mol/l at pH 6, time 35 minutes, temperature 25 °C, and adsorbing dose 0.1 g, the results showed a maximum removal percentage of 99.0 percent. The Freundlich isotherm and the pseudo-second order kinetic model both suit the experimental data well. According to thermodynamic studies, the process was spontaneous and endothermic.
The present work includes design, construction and operates of a prototype solar absorption refrigeration system, using methanol as a refrigerant to avoid any refrigerant that cause global warming and greenhouse effect. Flat plate collector was used because it’s easy, ninexpensive and efficient. Many test runs (more than 50) were carried out on the system from May to October, 2013; the main results were taken between the period of July 15, 2013 to August 15, 2013 to find the maximum C.O.P, cooling, temperature and pressure of the system. The system demonstrates a maximum generator temperature of 93.5 oC, on July 18, 2013 at 2:30 pm, and the average mean generator temperature Tgavr was 74.7 °C, for this period. The maximum pressure Pg
... Show MoreGetting knowledge from raw data has delivered beneficial information in several domains. The prevalent utilizing of social media produced extraordinary quantities of social information. Simply, social media delivers an available podium for employers for sharing information. Data Mining has ability to present applicable designs that can be useful for employers, commercial, and customers. Data of social media are strident, massive, formless, and dynamic in the natural case, so modern encounters grow. Investigation methods of data mining utilized via social networks is the purpose of the study, accepting investigation plans on the basis of criteria, and by selecting a number of papers to serve as the foundation for this arti
... Show MoreThis paper develop conventional Runge-Kutta methods of order four and order five to solve ordinary differential equations with oscillating solutions. The new modified Runge-Kutta methods (MRK) contain the invalidation of phase lag, phase lag’s derivatives, and ampliï¬cation error. Numerical tests from their outcomes show the robustness and competence of the new methods compared to the well-known Runge-Kutta methods in the scientiï¬c literature.
With the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show More