Background: This study aimed to determine the cephalometric values of tetragon analysis on a sample of Iraqi adults with normal occlusion. Material and methods: Forty digital true lateral cephalometric radiographs belong to 20 males and 20 females having normal dental relation were analyzed using AutoCAD program 2009. Descriptive statistics and sample comparison with Fastlicht norms were obtained. Results: The results showed that maxillary and mandibular incisors were more proclined and the maxillary/mandibular planes angle was lower in Iraqi sample than Caucasian sample. Conclusion: It's recommended to use result from this study when using tetragon analysis for Iraqis to get more accurate result.
The bilateral sagittal split osteotomy (BSSO) is the most popular orthognathic procedure performed by maxillofacial surgeons to treat skeletal class II and class III and to correct mandibular asymmetries. The study aimed to evaluate the lingual splitting patterns and lateral bone cut end (LBCE) in bilateral sagittal split osteotomy (BSSO) and their relation with the ramal thickness and the presence of impacted third molars using cone beam computed tomography (CBCT). This prospective observational study included patients with mandibular prognathism who were treated with BSSO with or without Le Fort I osteotomy. Cone beam computed tomography was used to measure the ramal thickness preoperatively and to evaluate the LBCE, and the lingu
... Show MoreThis research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to
Background: Understanding the morphological characteristics between the floor of the maxillary sinus and the tips of the maxillary posterior roots is crucial in orthodontics involving diagnosis and treatment planning. The aim of this study was to evaluate the distances from the maxillary posterior root apices to the inferior wall of the maxillary sinus, thickness and density of maxillary sinus floor using cone-beam computed tomography images and the relationships between roots and maxillary sinus according to gonial angle and skeletal pattern. Materials and methods: Three-dimensional images of each root were checked, and the distances were measured along the true vertical axis from the apex of the root to the sinus floor, and the thickne
... Show MoreABSTRACT : Diabetes mellitus stands for a set of metabolic diseases that if they are not managed, they can initiate threatening life problems. This study hypothesizes that insulin-like growth factor-1 level can be used as a biomarker for early diagnosing renal problems in patients with type 2 diabetic disease. This study included 30 recently identified type 2 diabetic patients with acute renal malfunction who had an entrance in National Diabetic Center,AL-Mustansiriyah University.They have beenin the Center from October 2018 up to end of April 2019. Their age range has been (40-62) years. Comprehensive clinical investigationhas beencompleted for each patient to discount other diabetic complications like cardiac, neurologic and eye complicat
... Show MoreThe hazardous metabolic effects of treating schizophrenia patients with olanzapine comprise serotonin 2C receptor (5-HT2C) antagonists. Metabolic side effects of antipsychotic drugs, including lipid abnormalities, disturbed glucose metabolism, and weight gain, can have a major impact on treating psychiatric patients. The intent of this study was to investigate whether there is an associated link between the genetic polymorphism at -759C>T in the promoter region of the 5-hydroxytryptamine 2C receptor (HTR2C) gene and the metabolic syndrome driven by olanzapine in schizophrenia patients. A cross-sectional study that involved fifty hospitalized patients with schizophrenia. The patients were split into two groups (metabolic and non-metab
... Show MoreThis study is planned to find relationship between interleukin-33 (IL-33) with its receptor interleukin-1 receptor 4 (IL-1R4), and assurance IL-33/IL-1R4 proportion as biomarker to atherosclerosisin rheumatoid arthritis (RA) Iraqi female’s patients with and without dyslipidemia. This study was attempted at Baghdad Teaching Hospital included 60 female’s patients with RA that were isolated into: 30 patients with dyslipidemia(G2), 30 patients without dyslipidemia(G3) and 30 individuals as control group (G1). Patients were experiencing treatment by methortexiene medication, analyzed by rheumatoid factor (RF) and erythrocyte sedimentation rate (ESR) tests. All patients and control groups age ranged from (30-55) years. The results show an inc
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More