Background: This review aimed at explaining different methods of canine retraction along the archwire. Methods: Searching for different methods of canine retraction using fixed orthodontic appliances was carried out using different databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and hand searching from 1930 till February 2022. Results: After excluding the duplicate articles, papers describing the methods of canine retraction along the archwires were included. The most commonly used methods are NiTi closed coil spring and elastic chain. Conclusions: Various methods of canine retraction along the archwires were explained in detail regarding their advantages, disadvantages, and comparisons among different methods supported by clinical trials, systematic review, and meta-analysis. The preferred method is canine retraction with NiTi closed coil spring with 150 and 200 gm. Elastic chain is considered an alternative, low-cost option.
the rationalization of energy consumption Require awareness in the possibility of bridging the local need severe shortage of electric power for daily requirements. The research aims to show that the engineers of various specializations and architects, including in particular can have an active role in about the importance of the role of energy in human life, and it’s best utilization without extravagance (which our religion forbids it). Here lies the problem of the research to find possible means and alternative methods to reduce (rationalization) electrical energy consumption in hot dry areas in general which need large energy for air conditioning because of the crucial climate of these regions that making access to the area o
... Show MoreThe challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio
... Show MoreOpportunistic fungal infections due to the immune- compromised status of renal transplant patients are related to high rates of morbidity and mortality regardless of their minor incidence. Delayed in identification of invasive fungal infections (IFIs), will lead to delayed treatment and results in high mortality in those populations. The study aimed to assess the frequency of invasive fungal infection in kidney transplant recipients by conventional and molecular methods. This study included 100 kidney transplant recipients (KTR) (75 males, and 25 females), collected from the Centre of Kidney Diseases and Transplantation in the Medical City of Baghdad. Blood samples were collected during the period from June 2018 to April 2019. Twent
... Show MoreThe extraction of Eucalyptus oil from Iraqi Eucalyptus Camadulensis leaves was studded using water distillation methods. The amount of Eucalyptus oil has been determined in a variety of extraction temperature and agitation speed. The effect of water to Eucalyptus leaves (solvent to solid) ratio and particle size of Eucalyptus leaves has been studied in order to evaluate the amount of Eucalyptus oil. The optimum experimental condition for the Eucalyptus oil extraction was established as follows: 100 C extraction temperature, 200 rpm agitation speed; 0.5 cm leave particle size and 6: 1 ml: g amount of water to eucalyptus leaves Ratio.
The objective of this study was to investigate and compare among five different methods of contraception including combined oral contraceptive pills (COC), Depot medroxyprogesterone acetate (DMPA), copper Intrauterine contraceptive device (IUCD), vaginal spermicides and male condom used in Hawler City through estimate of their effect, relative failure rate, percentage of use, adherence and compliance and adverse effects of each contraceptive method. In order to reach to these aims, a retrospective study was conducted in Hawler City in Azadi Health Care Center over a period of 6 months from 22th November, 2010 to 15th May, 2011 during which data collection and subjects follow up for 3 months had been achieved. A conv
... Show MoreThe importance of vibrations in rotating rotors in engineering applications has been examined, as has the best approach to interpreting vibration data. The most extensively used analytical approaches for rotating shaft vibration analysis have been investigated. In this research, a detailed study was made of the Rayleigh and Dunkerley methods due to their importance in the special calculations to find the amplitude of vibrations in the rotation system. The multi-node method was used to calculate both Dunkerley's and Rayleigh's methods. An experimental platform was built to study the vibrations that occur in the rotating shafts, and the results were compared with theoretical calculations and with different distances of the bearings. It pro
... Show MoreA roundabout is a highway engineering concept meant to calm traffic, increase safety, reduce stop-and-go travel, reduce accidents and congestion, and decrease traffic delays. It is circular and facilitates one-way traffic flow around a central point. The first part of this study evaluated the principles and methods used to compare the capacity methods of roundabouts with different traffic conditions and geometric configurations. These methods include gap acceptance, empirical, and simulation software methods. Previous studies mentioned in this research used various methods and other new models developed by several researchers. However, this paper's main aim is to compare different roundabout capacity models for acceptabl
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis study explores the challenges in Artificial Intelligence (AI) systems in generating image captions, a task that requires effective integration of computer vision and natural language processing techniques. A comparative analysis between traditional approaches such as retrieval- based methods and linguistic templates) and modern approaches based on deep learning such as encoder-decoder models, attention mechanisms, and transformers). Theoretical results show that modern models perform better for the accuracy and the ability to generate more complex descriptions, while traditional methods outperform speed and simplicity. The paper proposes a hybrid framework that combines the advantages of both approaches, where conventional methods prod
... Show MoreIt is generally accepted that there are two spectrophotometric techniques for quantifying ceftazidime (CFT) in bulk medications and pharmaceutical formulations. The methods are described as simple, sensitive, selective, accurate and efficient techniques. The first method used an alkaline medium to convert ceftazidime to its diazonium salt, which is then combined with the 1-Naphthol (1-NPT) and 2-Naphthol (2-NPT) reagents. The azo dye that was produced brown and red in color with absorption intensities of ƛmax 585 and 545nm respectively. Beer's law was followed in terms of concentration ranging from (3-40) µg .ml-1 For (CFT-1-NPT) and (CFT-2-NPT), the detection limits were 1.0096 and 0.8017 µg.ml-1, respec
... Show More