Background: The incisive canal is an anatomical structure with an important location in the anterior maxilla, analyzing this canal and its relation to the bone anterior to the canal is necessary during dental implant. Aim of this study is evaluated effect of gender, age and tooth loss in area of maxillary central incisors teeth on the dimensions of incisive canal and buccal bone anterior to the canal using spiral computed tomography. Materials and Methods: Sample consists of prospective study for 156 subjects for both gender, they divided into two groups, 120 dentate group (60 male and 60 female) with age ranging from (20-70) and 36 edentate group (with missing maxillary central incisors) (18 male and 18 female) with age ranging from (50-70). All subjects attended to Baquba teaching general hospital in Diyala for computed tomography scan investigation for different diagnostic purposes. The following were measured and recorded from sagittal section of CT for analysis 1-diameter and length of incisive canal.2- distance and length of buccal bone anterior to canal. Result: Gender had effect on the dimensions of incisive canal and buccal bones anterior to this canal, the mean values begin higher in male as compared to female. Dental status had effect on incisive canal length and buccal bone dimensions, mean values is higher in dentate than in edentate group, canal diameter remain unchanged with dental status. Age had no effect on all selected measurements in study sample. Duration of maxillary central incisors teeth loss had effect on canal length and buccal bone dimensions mean values begin lower in long duration than that in short duration while it had weak effect on incisive canal diameter. Conclusion: Gender and dental status are important factors that can affect incisive canal and amount of bone anterior to canal.
The primary focus of the study factor reverse polymerization styrene polymer kinetics and distribution weight Aljaia in Blma Aldhur free reverse The study was conducted wi Mamahakah and using the Monte Carlo method
The current rasearch which is entitled " The stylistic change in Kandinsky and Mondrian paintings – A Comparative Analytic study-" deals with the nature of change concept, its mechanisms and its constructive disciplines. The research has four chapters: The first chapter deals with the methodological Framework represented by the problem of the research which is concerned with the stylistic change and its role in activating formative disciplines. The research aims at, finding out the stylistic change in Kandinsky and Mondrian Paintings.&
... Show MoreThis study aimed at analyzing and studying the strategic and geopolitical importance of the Sahel region, which increased the regional competition for the resources of the region, especially the energy resources that have been and continue to be one of the axes of conflict and competition between these forces.
The researcher tried to review the competition between the international force, France, the United States of America, China, Algeria and Libya, and the African coast. We note that there is a positive correlation between the severity of the conflict and the intensity of the competition of the major powers to control the countries of the region and the extent of political and economic stability These countries are directly affecte
Influenza is a highly infectious and lethal viral disease, it appears on Earth periodically in connection with the passage of comet in the vicinity of Earth around the Sun .it is believed that particles spread from the tail of the comet due to solar heating energy ,are contaminated with very tiny small particles considered as viruses. Viruses reach the Earth with the power of the solar wind due to solar activity cycle which is driven every 11 year. Viruses pushed towards Earth’s atmosphere, then precipitate on clouds and reach the surface of Earth. These viruses are very well shielded and unaffected by even UV radiation ,but the only way the shell is melt when they passes through the digestive system . Results showed a good correlation
... Show MoreReading and analyzing Paula Vogel’s plays, the readers can attest that she achieves success in drama or theater because she is passionate about theater. Vogel is a modern American playwright who won the 1998 Pulitzer Prize for drama. Her success and insight in playwriting or in adapting do not come all of a sudden; she is influenced by many writers. Vogel is influenced by many American dramatists, including Eugene O’ Neill, Arthur Miller, Tennessee Williams, and Edward Albee, and by other non-American writers, including August Strindberg, Anton Chekhove, and Bertolt Brecht. Certainly, there were female playwrights who wrote preeminent plays and they influence Vogel as well. Nevertheless, dramas by female
... Show MoreA histological study was conducted to examine the structure of optic tectum in Hemidactylus flaviviridis. The results showed that the optic tectum consists of fourteen strata organized in three zones. The deep zone which extends from the first stratum (around optic ventricle) to the fifth stratum. The medium zone comprises the sixth & seventh strata, which represent the center of optic tectum. The superficial zone which extends from the eighth stratum to the fourteenth stratum and forms the retino recipient region. The strata of deep zone are called the Stratum Griseum et Periventricular ( SGAP ) , the sixth stratum is called the Stratum Album Central ( SAC ) and 
... Show MoreIn this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreIn this work, watershed transform method was implemented to detect and extract tumors and abnormalities in MRI brain skull stripped images. An adaptive technique has been proposed to improve the performance of this method.Watershed transform algorithm based on clustering techniques: K-Means and FCM were implemented to reduce the oversegmentation problem. The K-Means and FCM clustered images were utilized as input images to the watershed algorithm as well as of the original image. The relative surface area of the extracted tumor region was calculated for each application. The results showed that watershed trnsform algorithm succeedeed to detect and extract the brain tumor regions very well according to the consult of a specialist doctor a
... Show MoreCollaborative learning in class‐based teaching presents a challenge for a tutor to ensure every group and individual student has the best learning experience. We present Group Tagging, a web application that supports reflection on collaborative, group‐based classroom activities. Group Tagging provides students with an opportunity to record important moments within the class‐based group work and enables reflection on and promotion of professional skills such as communication, collaboration and critical thinking. After class, students use the tagged clips to create short videos showcasing their group work activities, which can later be reviewed by the teacher. We report on a deployment of Group Tagging in an undergraduate Computing Scie
... Show More