Cleft / palate is one of the common congenital deformities in craniofacial region, associated with different types of dental anomalies like (Tooth agenesis, impaction, and supernumerary teeth) with marked changes in palatal dimensions. This study aimed to determine the prevalence of teeth agenesis and dental anomalies in cleft lip/palate patients using CBCT, and to compare the palatal dimension of cleft group with control subjects. Twenty-eight cleft cases collected during the period from 2015 to 2022, CBCT images evaluated, the study sample classified into two groups (14 bilateral and 14 unilateral cleft lip/palate) and the non-cleft control group (14 CBCT images). The presence of dental anomalies was assessed in relation to cleft type, and then palatal width, arch width, and palatal depth measurements were performed. All linear measurements in mm compared with control group. Tooth agenesis was the most frequent dental anomalies in groups, 71.4% missing lateral incisors and 57.1% in bilateral and unilateral cleft groups respectively. Impacted canine and supernumerary teeth were more frequent in unilateral than bilateral cleft. Male had higher frequency of tooth agenesis and other anomalies. Palatal dimensions were higher in bilateral cleft group with very significant differences in palatal width and arch width. Accurate assessment of maxilla for tooth agenesis, dental anomalies and palatal dimensions is mandatory. Team workrequired for full rehabilitation of children with cleft lip/palate.
Mobile ad-hoc networks (MANETs) are composed of mobile nodes communicating through wireless medium, without any fixed centralized infrastructure. Providing quality of service (QoS) support to multimedia streaming applications over MANETs is vital. This paper focuses on QoS support, provided by the stream control transmission protocol (SCTP) and the TCP-friendly rate control (TFRC) protocol to multimedia streaming applications over MANETs. In this study, three QoS parameters were considered jointly: (1) packet delivery ratio (PDR), (2) end-to-end delay, (3) and throughput. Specifically, the authors analyzed and compared the simulated performance of the SCTP and TFRC transport protocols for delivering multimedia streaming over MANETs.
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreIsradipine related to dihydropyridine (DHP) class of calcium channel blockers (CCBs). It is used to treat hypertension, angina pectoris, as well as Parkinson disease. It goes under the BCS class II drug (low solubility-high permeability). The drug will experience extensive first-pass metabolism in liver, thus, oral bio-availability will be approximately15 to 24 %.
The aim of the study is preparing stable oral oil in water (o/w) nanoemulsion of isradipine to promote the colloidial dispersion of isradipine in the nano range, so that it may be absorded by intestinal lymphatic transport in order to avoid hepatic first-pass metabolism (israpidi
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreAbstract Daily dressing changes cause distress and pain for victims of burn injuries. The study aimed to determine the effect of music in reducing the pain and anxiety of thermally burned children during routine dressing changes. This quantitative study employed a randomized controlled trial design. The participants comprised 80 children at the Specialized Burns Hospital, in Baghdad, Iraq who were divided into two groups. The intervention group were exposed to three generic musical pieces (children’s music, nature sounds, and classical music) for 10-15 minutes. The researchers used the Objective Pain Scale, State-Trait Anxiety Inventory, and physiological parameters to measure the children’s responses immediately before the dressing cha
... Show MoreThe research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .
The current research aims at: - Identifying the role played by the leadership in empowerment and organizational learning abilities and their reflection on the knowledge capital, and the extent to which these concepts can be applied effectively at Wasit University. The problem of research .... In a series of questions: The most important is that the dimensions leadership empowerment and distance learning organizational capacity correlation relationship and impact and significant statistical significance with the capital knowledge.
To understand the nature of the relationship and the impact between the variables, leadership was adopted by empowerment as the fir
... Show More