Preferred Language
Articles
/
bsj-569
Using He-Ne laser irradiation for enhancing cartilage Autografts
...Show More Authors

thirty adult NewZealand rabbits used in this study, they were divided in to two groups (control and treaded with Helium — Neon laser). A square skin flap done on the medial aspect of the auricle of both sides, a square piece of cartilage incised, pealed out from each auricle and fixed in the site of the other, then the flaps sutured .The site of the operation in the rabbits of the treated group were irradiated using a Helium —Neon laser with (5mw) power for (10 days) began after the operation directly, (3 rabbits) from each group used for collection of specimens for histopathological examination at the weeks (1,2,3,4, & 6) weeks post the operation .The results revealed Early invasion of the matrix with elastic fibers which continue to the surrounding perichondrium, mature lacunae and complete healing occurred later at the 6th week in the treated group. Conclusion: Helium- Neon laser raised the mitotic activity of the cartilage cells, activated the reproduction processes in addition to the intra and extra regenerative reparation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change
The techno-strategy of the management information system and its role in enhancing risk management in the general directorate of school and sport activity
...Show More Authors

The importance of this research lies in shedding light on the concept of techno-strategy for information management from vital and important topics that showed response for change in all areas of life. As this necessitates the updating and changing of it in order to achieve its strategic goals and enhance its technological advantage. The research problem looked at the role of the information technology system (ITS) in enhancing risk management in general directorates for sports and school activity from the viewpoint of its department heads. The research aimed at the relationship of information techno-strategy in risk management and the ratios of the contribution of information techno-strategy in risk management from the viewpoint of heads o

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Sun Dec 31 2006
Journal Name
Journal Of Engineering
Theoretical Simulation Of Stress-Strain Relations For Some Iraqiclays Using The Endochronic Model
...Show More Authors

Publication Date
Sun Nov 01 2009
Journal Name
Tencon 2009 - 2009 Ieee Region 10 Conference
Optimizing the MPLS support for real time IPv6-Flows using MPLS-PHS approach
...Show More Authors

View Publication
Scopus (4)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Computational And Theoretical Nanoscience
Development of Wireless Controlling and Monitoring System for Robotic Hand Using Zigbee Protocol
...Show More Authors

Nowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control s

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Using a New Modification on Wind Turbine Ventilator for Improving Indoor Air Quality
...Show More Authors

This paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Using dickey _ fuller expanded test for testing variables of investment function in Iraq
...Show More Authors

         To ascertain the stability or instability of time series, three versions of the model proposed by Dickie-Voller were used in this paper. The aim of this study is to explain the extent of the impact of some economic variables such as the supply of money, gross domestic product, national income, after reaching the stability of these variables. The results show that the variable money supply, the GDP variable, and the exchange rate variable were all stable at the level of the first difference in the time series. This means that the series is an integrated first-class series. Hence, the gross fixed capital formation variable, the variable national income, and the variable interest rate

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Power System Stabilizer PSS4B Model for Iraqi National Grid using PSS/E Software
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The results showed

... Show More
Crossref (7)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Wed May 20 2026
Journal Name
Journal Of Physical Education
Analytical Study of Goalkeeper Positioning Using MH System for Free Kick in Soccer
...Show More Authors

View Publication