Preferred Language
Articles
/
ijl-349
PDF Cavity Disinfection Using Er,Cr:YSGG Laser Induced Photoacoustic Streaming Technique: Rand kareem Jassim Hussein Ali Jawad*
...Show More Authors

Abstract:

Aim: The goal of this research was to study the influence of Er,Cr:YSGG laser at short pulse duration (60 µsec) on the number of streptococcus mutans bacteria in vitro.

Material and Methods:  twenty-eight extracted third molars free of caries, cracks, and other irregularities were used. For the testing of the materials, both the agar well technique and a tooth cavity model were employed. The agar wells of plates that had been inoculated with Streptococcus mutans previously were stuffed with the test materials, in order to conduct the tests. The zones of inhibition were assessed using millimeter measurements, after an incubation period of 48 hours .In order to accomplish the tooth cavity model test, cylindrical cavities were invented in the occlusal surface of the teeth, which was kept even. The teeth were stored for 72 hours at 37°C in a broth culture of Streptococcus mutans. Following this, the teeth were divided arbitrarily into four groups of seven teeth (each including 14 cavity preparations). The experimental cavities in the first group (A) were not treated and considered as a control. In group B, a cavity disinfectant based on chlorhexidine was applied to the experimental cavities for 60 seconds. In group C, an erbium, chromium doped yttrium scandium gallium garnet laser was used at a short pulse duration (60 µsec) (0.25 watts, 15 Hz, 1% air, 1% water). In the last group, a chlorhexidine cavity disinfectant was applied for 60 seconds, followed by a laser treatment for 30 seconds with the same parameters as those described previously. The teeth were stored in saline for a period of three days. Standard amounts of dentin chips were retrieved from the cavity walls. ANOVA test was used to analyze repeated measure mean between tested concentration and control. Data expressed as mean ±SE.  LSD tests was used to calculate the significant differences between tested mean.

Result: After the statistical test, the highly significant difference in the diameter of inhibition zone was observed in group D (26 mm) where both chlorhexidine and laser were used followed by group B (18.71 mm) where the chlorhexidine gluconate based cavity disinfectant used alone, the least significant difference observed in group C (10.26mm) where the laser used alone.

Conclusion: According to this in vitro study, a photon-induced photoacoustic streaming technique using an Er,Cr:YSGG pulse laser at short pulse duration effectively agitates a chlorhexidine-based cavity disinfectant, which leads to the inhibition of Sterptococcus Mutans.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Database for Baghdad Soil Using GIS Techniques
...Show More Authors

teen sites Baghdad are made. The sites are divided into two groups, one in Karkh and the other in Rusafa. Assessing the underground conditions can be occurred by drilling vertical holes called exploratory boring into the ground, obtaining soil (disturbed and undisturbed) samples, and testing these samples in a laboratory (civil engineering laboratory /University of Baghdad). From disturbed, the tests involved the grain size analysis and then classified the soil, Atterberg limit, chemical test (organic content, sulphate content, gypsum content and chloride content). From undisturbed samples, the test involved the consolidation test (from this test, the following parameters can be obtained: initial void ratio eo, compression index cc, swel

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Human Dynamic Behavior: Reconstruction Trajectories Using CDRs
...Show More Authors
Abstract<p>Investigating the human mobility patterns is a highly interesting field in the 21th century, and it takes vast attention from multi-disciplinary scientists in physics, economic, social, computer, engineering…etc. depending on the concept that relates between human mobility patterns and their communications. Hence, the necessity for a rich repository of data has emerged. Therefore, the most powerful solution is the usage of GSM network data, which gives millions of Call Details Records gained from urban regions. However, the available data still have shortcomings, because it gives only the indication of spatio-temporal data at only the moment of mobile communication activities. In th</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Fuzzy-assignment Model by Using Linguistic Variables
...Show More Authors

      This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2017
Journal Name
2017 Annual Conference On New Trends In Information &amp; Communications Technology Applications (ntict)
An efficient color quantization using color histogram
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Desalination by Membrane Distillation Using Electrospun Membranes
...Show More Authors

Electrospinning is a novel technique that can be used to produce highly porous fibers with highly tunable properties. In this research, this technique is adopted to prepare the electrospun nanofiber membrane for membrane distillation application. A custom-built electrospinning setup was made to prepare the nanofibers membrane. Polyvinylidene fluoride (PVDF) polymer was used in the electrospinning process due to its high hydrophobicity. Electrospun (PVDF) nanofibers were tested in direct contact membrane distillation (DCMD) process using 0.6 M sodium chloride as a feed solution. The resulting nanofiber membrane exhibited high performance in DCMD (i.e. relatively high water flux and high salt rejection). It has been found

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network