Preferred Language
Articles
/
eBbqXIcBVTCNdQwCIUfp
Experimental polyethylene-hydroxyapatite carrier-based endodontic system: an in vitro study on dynamic thermomechanical properties, sealing ability, and measurements of micro-computed tomography voids
...Show More Authors

The dynamic thermomechanical properties, sealing ability, and voids formation of an experimental obturation hydroxyapatite-reinforced polyethylene (HA/PE) composite/carrier system were investigated and compared with those of a commercial system [GuttaCore (GC)]. The HA/PE system was specifically designed using a melt-extrusion process. The viscoelastic properties of HA/PE were determined using a dynamic thermomechanical analyser. Human single-rooted teeth were endodontically instrumented and obturated using HA/PE or GC systems, and then sealing ability was assessed using a fluid filtration system. In addition, micro-computed tomography (μCT) was used to quantify apparent voids within the root-canal space. The data were statistically analysed using one-way anova and post hoc tests. The HA/PE composite exhibited important modulus and damping changes with an increase of temperature. The HA/PE system was more flexible than GC as the modulus of GC appeared to be significantly higher than that of HA/PE as a result of the high positive glass transition temperature (Tg). However, HA/PE and GC presented similar sealing abilities. In conclusion, because sealing ability and voids formation were comparable between the tested materials, the experimental HA/PE system may be considered a suitable alternative material for root-canal obturation. Moreover, HA/PE possesses specific viscoelastic behaviour and lower melting points, which may facilitate root-canal retreatments.

Clarivate Crossref
View Publication
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Sun Dec 31 2023
Journal Name
Iraqi Journal Of Information And Communication Technology
EEG Signal Classification Based on Orthogonal Polynomials, Sparse Filter and SVM Classifier
...Show More Authors

This work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Fast Shot Boundary Detection Based on Separable Moments and Support Vector Machine
...Show More Authors

View Publication
Scopus (26)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
A study of some atomic properties for He-like selected ions
...Show More Authors

The atomic properties have been studied for He-like ions (He atom, Li+, Be2+ and B3+ions). These properties included, the atomic form factor f(S), electron density at the nucleus , nuclear magnetic shielding constant and diamagnetic susceptibility ,which are very important in the study of physical properties of the atoms and ions. For these purpose two types of the wave functions applied are used, the Hartree-Fock (HF) waves function (uncorrelated) and the Configuration interaction (CI) wave function (correlated). All the results and the behaviors obtained in this work have been discussed, interpreted and compared with those previously obtained.

View Publication Preview PDF
Crossref
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology
Comparative Study for Optoelectronic Properties of Zn (Te, Se) Solar Cells
...Show More Authors

View Publication
Scopus (13)
Crossref (10)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
European Journal Of Biology And Medical Science Research
Impact of an educational intervention of training of breast feeding promoting on the knowledge and attitude of a sample of mothers: a study of a pre and post evaluation.
...Show More Authors

Background: Health professionals have a crucial role in promotion, support and management of breastfeeding. To be effective in this effort, the clinician should focus on the issue from the preconception stage through pregnancy and delivery, and continue in subsequent infant care. Aim of the study: to assess the effectiveness of the UNICEF/WHO 40-hour of breast feeding training through the assess breastfeeding knowledge and attitudes of the health profession staff before and after training course.

Publication Date
Fri Jun 20 2025
Journal Name
Baghdad Science Journal
The Role of Fear and Predator Dependent Refuge on a Stage Structure Prey-Predator System
...Show More Authors

The present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF