Background: The skull offers a high resistance of adverse environmental conditions over time, resulting in the greater stability of the dimorphic features as compared to other skeletal bony pieces. Sex determination of human skeletal considered an initial step in its identification. The present study is undertaken to evaluate the validity of 3D reconstructed computed tomographic images in sex differentiation by using craniometrical measurements at various parts of the skull. Materials and Method: 3D reconstructed computed tomographic scanning of 100 Iraqi subject, (50 males and 50 females) were analyzed with their age range from20-70 years old. Craniometrical linear measurements were located and marked on both side of the 3D skull images. Results: For the all parameters measured for sexes the mean value for Male had significantly greater than females with (p value < 0.001). A receiver operating characteristic curves was obtained for each variable to observe their overall performance in sex determination. The area of mastoid triangle was found the best variable in sex differentiation (ROC area =0.97 for unilateral skull measurements and 0.98 for bilateral measurements).while EU-EU was found to be the least one. Conclusion: 3D reconstructed Computed tomography scanning is a good diagnostic method for analyzing the craniometrical measurements of sex determination. sex differentiation for isolated part of the skull when only the fragmentary crania is available, could be achieved and the highest accuracy in sex determination can be obtained whether part or complete skull available.
As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MorePurpose: As a result of the sudden and ill-considered trade openness of Iraq after 2003 to the countries of the world in general and the neighboring countries in particular, and in the absence of the necessary support for the national productive forces and the lack of effective standardization and quality control devices, this led to the exposure of most local products, especially agricultural ones, to decline and inability On the competition and thus dumping the Iraqi market, especially the agricultural products, with imported products, this study came to find out the effect that dumping has on the local production of chicken meat and the impact of that impact on the size of the food gap, and whether the results of the practica
... Show MoreWe discussed the proper preparation, directing, and implementation of physical education lessons, and clarification of the duties that fall upon the physical education teacher in addition to his physical and skill duties, which is the duty of the physical education lesson. The problem of the research lies in the fact that interactive harmonic exercises are not implemented accurately by physical education teachers because they require great experience, exceptional efforts, and accuracy in performance. The research aims to identify the level of some physical and motor abilities and intelligence among students aged (9-10) years, and to know the effect of some harmonic exercises. Interactivity at the level of some physical and motor abi
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper