Background: Orthodontic mini-implants are increasingly used in orthodontics and the bone density is a very important factor in stabilization and success of mini-implant. The aim of this study was to observe the relationship among maximum bite force (MBF); body mass index (BMI); face width, height and type; and bone density in an attempt to predict bone density from these variables to eliminate the need for CT scan which have a highly hazard on patient. Materials and Methods: Computed tomographic (CT) images were obtained for 70 patients (24 males and 46 females) with age range 18-30 years. The maxillary and mandibular buccal cortical and cancellous bone densities were measured between 2nd premolar and 1st molar at two levels from the alveolar crest (3 and 6 mm). Face height and width were measured from CT. Clinically; Maximum bite force was measured on first molar region unilaterally by a digital device. The sample was divided into two groups according to the body mass index into; normal and overweight. Results: The results obtained showed that there were no statistical significant differences in MBF or bone density in both genders. Only the cortical bone density in maxilla in overweight group tended to be higher than normal BMI group. The face width and height correlated significantly negatively with MBF which correlated significantly positively with cortical bone density. Conclusions: It was concluded that a prediction of cortical bone density of preselected areas can be made from maximum bite force, body mass index and inter-zygomatic width.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis search that addressed with (( The Impact of Cultural Dimensions in multicultural Project Teams )) tagged is important variables in the project environment that rare has been adverted in Arabic studies . The search problem is reflected in missing of awareness towards a cultural dimensions of the Diyala bridge area project team and their impact in project communications ، as well as weak project management interest in adopting a clear and scientific approach in the management and organization of project communications in order to reach the objective of the study ، was used questionnaire that built depending on previous global studies and has been adapted to accommodate Iraqi business e
... Show MorePsoriasis is a dermatological, chronic, immune-mediated condition. Psoriasis symptoms are not associated with physical burden only, but it may also have psychosocial effects on patients, diminished cognitive control, poor body image and impairments in everyday life. The value of quality of life is important since improving it is the principal goal for non-curative disease. The aim of the current study was to evaluate quality of life in a sample of Iraqi patients with psoriasis. This study is a cross-sectional study that involved 300 already diagnosed psoriasis patients who attended to the center of Dermatology and Venereology, Medical City/Baghdad. The mean age of patients was (35.156 ±10.549 years). The Arabic version of Dermatology Li
... Show MorePolycystic ovary syndrome (PCOS) referring to a syndrome that is recognized as a life-course disease and has both metabolic and reproductive signs; main pathophysiological cause includes insulin resistance, hyperandrogenism, and oxidative stress state. The study aimed to assess the impact of combining Myoinositol and Metformin, the main insulin-sensitizing drugs, on improving clinical, metabolic, and hormonal parameters in females with PCOS. A clinical trial that was prospective, randomized, and comparative on 54 patients (aged 18-40 y) are divided into three groups: group1 patients allocated to receive Myo-inositol(4g), group2 patients assigned to receive Metformin(1g) and group3 patients assigned to receive Myo-inositol(4g) + Metformin
... Show MoreRecord, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)
When a person found himself in a life he did not understand، he tried to create in his imagination powers and gods that tried to protect him from his ignorance of that world، and when he was reassured internally through those fantasy creatures when he made them the greatest protector and the source of his existence and his being، he began to weave myths and myths until he created his reality that he did not have. Any hint، and when we go back to the mechanism of embodying those myths، myths and fantasias in which he lived، we will find that the first building blocks were written on the walls of the caves in which he lived during that period. And when his thought developed and thus his expressive means developed، he began to embody
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More