Cleft / palate is one of the common congenital deformities in craniofacial region, associated with different types of dental anomalies like (Tooth agenesis, impaction, and supernumerary teeth) with marked changes in palatal dimensions. This study aimed to determine the prevalence of teeth agenesis and dental anomalies in cleft lip/palate patients using CBCT, and to compare the palatal dimension of cleft group with control subjects. Twenty-eight cleft cases collected during the period from 2015 to 2022, CBCT images evaluated, the study sample classified into two groups (14 bilateral and 14 unilateral cleft lip/palate) and the non-cleft control group (14 CBCT images). The presence of dental anomalies was assessed in relation to cleft type, and then palatal width, arch width, and palatal depth measurements were performed. All linear measurements in mm compared with control group. Tooth agenesis was the most frequent dental anomalies in groups, 71.4% missing lateral incisors and 57.1% in bilateral and unilateral cleft groups respectively. Impacted canine and supernumerary teeth were more frequent in unilateral than bilateral cleft. Male had higher frequency of tooth agenesis and other anomalies. Palatal dimensions were higher in bilateral cleft group with very significant differences in palatal width and arch width. Accurate assessment of maxilla for tooth agenesis, dental anomalies and palatal dimensions is mandatory. Team workrequired for full rehabilitation of children with cleft lip/palate.
In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreA theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namely 7-Ethyl-4-methyl-1-[(4-nitro-benzylidene)-amino]-1H-quinolin-2-one (EMNQ2O). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G/ 2d, 2p level was carried out to calculate the geometrical structure, physical properties and chemical inhibition chemical parameters, with the local reactivity in order to predict both the reactive centers and to know the possible sites of nucleophilic and electrophilic attacks, in vacuum and two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in (3.5% NaCl)
... Show MoreBackground: Dental implant surface technologies have been evolving rapidly to enhance a more rapid bone formation on their surface and improve implant therapy.Implant threads should be designed to increase surface contact areathat induced better stability. In addition, implant surface coating with Flaxseed was used to enhance bone formation at the bone-implant interface. Materials and methods: Ninety-six commercially pure titanium (CpTi) screws were implanted in rabbits' tibiae and divided into three groups as dual-threaded group, flaxseed-coated group and control group. All groups were evaluated mechanically, histologically and radiographically after each healing periods (2, 4, 6 and 8) weeks and the resulting data were statistically analy
... Show MoreThe complexes of the 2-hydroxy-4-Nitro phenyl piperonalidene with metal ions Cr(III), Ni(II), Pt(IV) and Zn(II) were prepared in ethanolic solution. These complexes were characterized by spectroscopic methods, conductivity, metal analyses and magnetic moment measurements. The nature of the complexes formed in ethanolic solution was study following the molar ratio method. From the spectral studies, monomer structures proposed for the nickel (II) and Zinc (II) complexes while dimeric structures for the chromium (III) and platinum (IV) were proposed. Octahedral geometry was suggested for all prepared complexes except zinc (II) has tetrahedral geometry, Structural geometries of these compounds were also suggested in gas phase by using
... Show MoreBackground: Restoration of root canal treated teeth with a permanent restoration affect in the success of endodontically treated teeth. This in vitro study was performed to evaluate and compare the fracture strength of endodontically treated teeth restored by using custom made zirconium posts and cores, prefabricated carbon fiber, glass fiber and zirconium ceramic posts. Materials and method: Forty intact human mandibular second premolars were collected for this study and were divided into five groups. Each group contains 8 specimens: Group1: Teeth restored with Carbon Fiber Posts; Group2: Teeth restored with Glass Fiber Posts; Group3: Teeth restored with Zirconium Ceramic prefabricated Posts; Group4: Teeth restored with Zirconium Posts
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More