This review discusses the gingival biotypes, their characteristics, analysis based on the measurement of the dentopapillary complex. Also discuss their response to inflammation, surgery, and ridge healing after tooth extraction, their influence in the behavior of the peri-implant tissue
Ultrasound is a mechanical energy which can generate altering zones of compression and rarefaction along its path in the tissues. Ultrasound imaging can provide a real time screening for blood and multiple organs to aiding the diagnostic and treatment. However, ultrasound has the potential to deposit energy in the blood and tissues causing bio effects which is depending on ultrasound characteristics that including frequency and the amount of intensity. These bio effects include either a stable cavitation presented non thermal effects or inertial cavitation of harmful effect on the tissues. The non-thermal cavitation can add features in diagnostic imaging and treatment more than the inertial cavitation. Ultrasound Contrast agents are a micro
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreMost of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.
ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with
... Show Moreole in all sta
Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and flui
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreThe number of infections caused by microorganisms is increasing significantly over the last few years. A total of 140 patients admitted to the central teaching hospital of pediatrics from the 1st of Jun 2017 to 31 October 2017. The Clinical samples was processed from culture and sensitivity testing. Antibiotic discs used for gram negative isolates. The most prevalent gram negative isolates included Escherichia coli 63 (45.0 %), Pseudomonas spp. 21 (15.0 %), Klebsiella spp. 19 (13.6 %) predominantly. Escherichia coli were the most prevalent isolates from urine 45 (71.4 %), Klebsiella spp. 11 (57.9 %) and Enterobacter spp. 11 (68.8 %) followed by Escherichia coli 10 (15.9 %) predominant from blood. 68 (48.6 %) of specimens were urine, 47 (33.
... Show MoreUropathogenic Escherichia coli is the main cause of urinary tract infections, the ability of this bacteria to cause urinary tract infections is related to a variety of virulence factors that enhance colonization and evade the immune response, one of these virulence factors is cytotoxic necrotizing factor 1 toxin which converts the glutamine residue to glutamic acid to activated GTPase Rho family. The study was meant to find out the prevalence rate of the cnf1 gene in Uropathogenic Escherichia coli isolated from Iraqi patients. Conventional laboratory methods were used for primary bacterial identification and molecular methods were used to confirm bacterial identity and gene detection. Escherichia coli was identified in 89/165 (53.93%) of th
... Show MoreThe research aims to identify the future teachers' attitudes toward cloud computing in the Kingdom of Saudi Arabia from their point of view. The research adopted the descriptive approach, and a questionnaire was applied to a random sample of (370) male and female teachers in governmental and private general education schools in the Al-Jouf region, Saudi Arabia. The results of the research concluded that the reality of future teachers' attitudes towards cloud computing in the Kingdom of Saudi Arabia from their point of view is very high and that most areas of using computing are in the field of assessment, then teaching, and activities. The challenges of future teachers' attitudes toward cloud computing are recorded at a high level, parti
... Show More