Background: The incisive canal is an anatomical structure with an important location in the anterior maxilla, analyzing this canal and its relation to the bone anterior to the canal is necessary during dental implant. Aim of this study is evaluated effect of gender, age and tooth loss in area of maxillary central incisors teeth on the dimensions of incisive canal and buccal bone anterior to the canal using spiral computed tomography. Materials and Methods: Sample consists of prospective study for 156 subjects for both gender, they divided into two groups, 120 dentate group (60 male and 60 female) with age ranging from (20-70) and 36 edentate group (with missing maxillary central incisors) (18 male and 18 female) with age ranging from (50-70). All subjects attended to Baquba teaching general hospital in Diyala for computed tomography scan investigation for different diagnostic purposes. The following were measured and recorded from sagittal section of CT for analysis 1-diameter and length of incisive canal.2- distance and length of buccal bone anterior to canal. Result: Gender had effect on the dimensions of incisive canal and buccal bones anterior to this canal, the mean values begin higher in male as compared to female. Dental status had effect on incisive canal length and buccal bone dimensions, mean values is higher in dentate than in edentate group, canal diameter remain unchanged with dental status. Age had no effect on all selected measurements in study sample. Duration of maxillary central incisors teeth loss had effect on canal length and buccal bone dimensions mean values begin lower in long duration than that in short duration while it had weak effect on incisive canal diameter. Conclusion: Gender and dental status are important factors that can affect incisive canal and amount of bone anterior to canal.
Continuous conflict between Parisian and Ottoman states the results that Iraq became as
aground for their battles which leads to their own interests in Iraq which are shape their
strategy. The conflict continues for long time. In spite of, they signed many treatments and
protocols between the two sides, as Arzarom treaty , the first and the second, Tahran protocols
, and Astana protocol. This conflict, no sides of them to dose any part of their land, but these
treaties leaded to a big loss to Iraq ,which lost parts of it's land and water area in Ahwaz and
shatt AL-Arab, so, Iraq became as a smoth target for their interests, and lost its
sovereignty,and lost self-govern of the country country . so the research conclud
The public procurement crisis in Iraq plays a fundamental role in the delay in the implementation of construction projects at different stages of project bidding (pre, during, and after). The procurement system of any country plays an important role in economic growth and revival. The paper aims to use the fuzzy logic inference model to predict the impact of the public procurement crisis (relative importance index and Likert scale) was carried out at the beginning to determine the most important parameters that affect construction projects, the fuzzy analytical hierarchy process (FAHP) to set up, and finally, the fuzzy decision maker's (FDM) verification of the parameter for comparison with reality. Sixty-five
... Show MoreCopper doped Zinc oxide and (n-ZnO / p-Si and n-ZnO: Cu / p-Si) thin films thru thickness (400±20) nm were deposited by thermal evaporation technique onto two substrates. The influence of different Cu percentages (1%,3% and 5%) on ZnO thin film besides hetero junction (ZnO / Si) characteristics were investigated, with X-ray diffractions examination supports ZnO films were poly crystal then hexagonal structural per crystallite size increase from (22.34 to 28.09) nm with increasing Cu ratio. The optical properties display exceptional optically absorptive for 5% Cu dopant with reduced for optically gaps since 3.1 toward 2.7 eV. Hall Effect measurements presented with all films prepared pure and doped have n-types conductive, with a ma
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreIn this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show MoreIn this paper, we define a cubic bipolar subalgebra, $BCK$-ideal and $Q$-ideal of a $Q$-algebra, and obtain some of their properties and give some examples. Also we define a cubic bipolar fuzzy point, cubic bipolar fuzzy topology, cubic bipolar fuzzy base and for each concept obtained some of its properties.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreIndustrial product is one of the things of daily use and direct interaction with the user, so the ranges of its association to the user, took a varied and multiple aspects. The user today sees the products as things have specifications related directly to the psychology of the user, so he can reflects his values, principles and ideas on the composition of the total structure of the product, making them a means by which manifested the internal entity's of the user took an external materiality. And then counting the products being things excite positive feelings among different user was a natural result given the complexity of the relationship between the user and the industrial product. So pleasure is one important effects that result fro
... Show More