Background: The purpose of this study was to assess the relation among the ramal length and width with various cervical and cranio-facial measurements for a sample of Iraqi adults with different skeletal classes. Materials and method: The sample composed of 71 Iraqi adults (36 females and 35 males) with an age ranged between 17-30 years and had different skeletal mal-relations using SNA, SNB and ANB to differentiate between them and assorting them into CL.I, CL.II and CL.III mal-relation. Each individual was subjected to clinical examination and digital true lateral cephalometric radiograph that had been analyzed using AutoCAD 2007 software computer program to determine sixteen linear and ten angular measurements. Descriptive statistics were obtained and independent samples t-test was performed to evaluate the gender differences in different classes. ANOVA test as used to compare the measurements among the skeletal classes in each gender, while Pearson’s correlation coefficient test was used to determine the relations among ramal length and width with other measurements in all classes. Results and Conclusions: All of the linear measurements were significantly higher in males than females. On the other hand, the angular measurements showed non-significant gender difference except for SN-PP angle in class II group. ANOVA test showed statistically significant difference in upper gonial angle, Y-axis angle and the mandibular length. Ramal length and width correlated significantly with PFH, SN-MP angle and Co-Gn.
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreObjective: To assess of Science Teachers' Awareness towards Communicable Diseases Control in Baghdad City
Primary Schools
Methodology: A descriptive study was conducted, included (100) primary school, (50) in Al-Rassafa sector, and
(50) in Al-Karkh sector, from March 5th 2012 to March 15th 2013, to assess of science teachers' awareness
towards communicable diseases control. A cluster sample of (100) Science teachers (males and females) were
selected, as one teacher from each school. A questionnaire format was used for data collection. The validity of
questionnaire was estimated through a penal of experts related to the field of study, and its reliability was
estimated through a pilot study conducted in (20) schools (
A field study was conducted in Al-Khalis district, Diyala Governorate in 2019 to test the sensitivity of three varieties of pepper to the population density of the whitefly B. tabaci, Anaheim pepper, Aleppo and local variety, and the results showed that the Anaheim variety was the most infested with the whitefly density 4.08 whitefly/ leaf and then the local variety 2.7 whitefly/ leaf. The lowest population density was 1.25 whitefly/ leaf of Aleppo variety. Variety Aleppo also recorded the lowest percentage of whitefly infection B. tabaci of 39.22%, but not have significant differences in the percentage of whitefly infestation, as it reached 53.64% and 54.85% for the Anaheim and local varieties, respectively. The resistance of variety Alepp
... Show MoreThe downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r
... Show MoreThis paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak. A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.
What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does
... Show MoreHeart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreCement-based adhesive (CBA) is used as a bonding agent in Carbon Fibre Reinforced Polymer (CFRP) applications as an alternative to epoxy-based adhesive due to the drawbacks of the epoxy system under severe service conditions which negatively affect the bond between the CFRP and strengthened elements. This paper reports the results of, an investigation carried out to develop two types of CBA using magnetized water (MW) for mixing and curing. Two magnetic devices (MD-I and MD-II), with different magnetic field strengths (9000 and 6000 Gauss) respectively, were employed for water magnetization. Different water flows with different water circulation times in the magnetizer were used for each device. Compressive and splitting tensile strength te
... Show MoreThe best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.
... Show More