Preferred Language
Articles
/
ijl-232
A Comparison between Er,Cr:YSGG 2780 nm Laser and Carbide Fissure Bur in Root-End resection
...Show More Authors

Aim: The Aim of the study is to compare between Er,Cr:YSGG 2780 nm laser and carbide fissure bur in root-end resection regarding the morphological variations, temperature changes and the duration of resection process.

Settings and Design: 5 W, 25 Hz, 50% water, 80% air,25.47 J/cm2 .

Material and method: twenty-one extracted single rooted teeth endodontically were treated, twenty teeth were obturated and divided into two groups according to method of resection. Group 1 root-end resected using cross cut carbide bur while group 2 root-end resected using laser with MGG6 sapphire tip of 600 μm diameter. Temperature on external root surface and duration of resection were recorded. The remaining tooth served as control. Samples were prepared for SEM and examined to evaluate dentinal cracks, cemental damage, roughness, filling material-root canal wall interface.

Statistical Analysis: whenever required, x2 test/Fisher exact and Kruskal–Wallis test were used.

Results: laser result in intradentin cracks in 70% of samples while bur cause intradentin crack in 30% of samples. There was no significant difference between group 1 and 2 regarding the percentage of complete and incomplete cracks. Resection with bur resulted in cemental damage in 70% of samples while resection with laser didn’t result in cemental damage in any of the samples .Evaluation of surface roughness revealed statistically significant difference (P ≤ 0.05). The difference in duration of resection was statistically significant while in recorded temperature was not significant.

Conclusion: Er,Cr:YSGG laser showed higher percentage of intradentinal cracks, no cemental damage, larger gap area ,rougher surface and longer time for resection than bur .There is no elevation of temperature on external root surface.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Privatization Thesis and its trends in Iraq after 2003
...Show More Authors

The concept of privatization is built on the basis of the transfer of assets and services of the public sector to the private sector this concept has appeared in the eighties of the last century whene the high oil prices took place and recession solution swept the world Which called for the freedom of the market and left the room for the private sector to take the initiatine in economic activity.         Both the IMF have   adopted this thesis in their programs of the structural adjustment in light of external and internal factors helped to Create the conditions to accept thesis that under the pretext of achieving a number of economic goals.

In Iraq in spite of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Oil Sector in Iraq (Reality and Prospects) Economic Analysis
...Show More Authors

   The oil sector in Iraq suffered from several difficulties led to the decline and reduction of oil production and the deterioration of refineries and transport pipeline status in addition to the weakness of the technology side and the prevalence of financial and administrative corruption besides the high costs of rehabilitation of the oil sector and also administrative and institutional problems still ongoing. 

 In spite of Iraq's possession of vast oil wealth allows him to play an important role in the international energy market، he is still under the level. The production of oil doesn'<

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
Grammarians’ opinions on stopping and tilting in Al-Kanz by Al-Wasiti
...Show More Authors

Praise be to God, and may blessings and peace be upon our master and Prophet Muhammad and those who follow him, and may God be pleased with him

Taha is my guardian and whoever follows their path until the Day of Judgment. And after... The book (The Treasure in the Ten Recitations), written by Abu Muhammad Abdullah bin Abd al-Wasiti, who died in the year 710 AH, is considered one of the important books in recitations: because it included the universal custom that it contained in the books Al-Taysir by Al-Dani and Al-Irshad by Al-Falanisi, as the first of them was specialized.

Satisfy the second with the ten readings

May God bless my time, through His grace and generosity, to achieve this treasure and to publish it

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 12 2010
Journal Name
Journal Of Planner And Development
The stage of change and institution-building and its impact on the structure of housing policy in Iraq
...Show More Authors
The research examines the reality of the housing sector in Iraq and the stage of change and institution-building, which is increasingly challenging to respond to development needs. The legal legislation in Iraq over the last five years indicates a significant shift towards decentralization, with powers and services being delegated from federal ministries to regional levels Localization and growth in cities and urban centers is an added factor that requires responses from local governments to strengthen the capacity of their institutions to engage in national policy debate at the re
... Show More
View Publication Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Sat Nov 27 2021
Journal Name
Route Educational & Social Science Journal
A STYLISTIC ANALYSIS OF ADVERTISING DISCOURSE: A CASE STUDY OF FACEBOOK COMMERCIAL ADVERTISEMENT
...Show More Authors

BN Rashid

View Publication
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Design of a PID-Lead Compensator for a Twin Rotor Aerodynamic System (TRAS)
...Show More Authors

This paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the s-plane. This has the effect

... Show More
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More