Background: Curve of Spee (CS) is an anteroposterior anatomical curve established by the occlusal alignment of the teeth viewed in the sagittal plane. This occlusal curvature has clinical importance in orthodontics and other fields of dentistry. This study aimed to evaluate the relationship between the CS and dentofacial morphology of different skeletal patterns in both genders. Materials and Methods: Eighty six Iraqi Arab subjects (44females,42 males ) their age ranged from 17 -30 years, classified into: Skeletal I with normal occlusion(15 females and 15 males), skeletal II with CI II div 1 malocclusion (15 females and 15 males) and skeletal III with CI III malocclusion (14 females and 12 males). Forty one variables measured using direct dental cast measurements , dental cast photographs and cephalometric radiographs with the aid of AutoCAD program version 15 (2006). Results: No significant differences in the CS depth between males and females or between right and left sides in both arches of different skeletal patterns. No significant differences in the maxillary CS among the 3 skeletal patterns, the mandibular CS in CI II div 1 malocclusion was larger than normal occlusion and CI III malocclusion. Maxillary CS significantly correlated to arch length, inter canine distance and inter second premolar distance in normal occlusion and overbite in Cl III malocclusion. Mandibular CS significantly correlated with overbite and overjet in Cl II div 1 and Cl III malocclusions. Conclusions: CS was not influence by sides and gender in both arches of different skeletal patterns. CS was concave in the mandibular arch with the maximum concavity at the mesio-buccal cusp tip of the mandibular first molar and convex in the maxillary arch with the maximum convexity at the buccal cusp tip of the maxillary second premolar, in different skeletal patterns. Key words: Curve of Spee, arch length, overbite, overjet, dentofacial morphology.
Most studies on deep beams have been made with reinforced concrete deep beams, only a few studies investigate the response of prestressed deep beams, while, to the best of our knowledge, there is not a study that investigates the response of full scale (T-section) prestressed deep beams with large web openings. An experimental and numerical study was conducted in order to investigate the shear strength of ordinary reinforced and partially prestressed full scale (T-section) deep beams that contain large web openings in order to investigate the prestressing existence effects on the deep beam responses and to better understand the effects of prestressing locations and opening depth to beam depth ratio on the deep beam performance and b
... Show MoreThe electrocardiogram (ECG) is the recording of the electrical potential of the heart versus time. The analysis of ECG signals has been widely used in cardiac pathology to detect heart disease. The ECGs are non-stationary signals which are often contaminated by different types of noises from different sources. In this study, simulated noise models were proposed for the power-line interference (PLI), electromyogram (EMG) noise, base line wander (BW), white Gaussian noise (WGN) and composite noise. For suppressing noises and extracting the efficient morphology of an ECG signal, various processing techniques have been recently proposed. In this paper, wavelet transform (WT) is performed for noisy ECG signals. The graphical user interface (GUI)
... Show MoreFlow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreHTH Ahmed Dheyaa Al-Obaidi,", Ali Tarik Abdulwahid', Mustafa Najah Al-Obaidi", Abeer Mundher Ali', eNeurologicalSci, 2023
في السنوات الأخيرة، أدى التقدم التكنولوجي في إنترنت الأشياء (IoT) وأجهزة الاستشعار الذكية إلى فتح اتجاهات جديدة وإعطاء حلول عملية في مختلف قطاعات الحياة. يتم التعرف على إنترنت الأشياء كتنولوجيا حديثة تربط بين مختلف انواع الشبكات. تم تحسين أنواع مختلفة من قطاعات الرعاية الصحية في المجال الطبي بناءً على هذه التكنولوجيا. أحد هذه القطاعات الهامة هو نظام مراقبة الصحة (HMS). تعتبر مراقبة المريض عن بعد لاسلكيًا وبت
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreData scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for