Preferred Language
Articles
/
ijl-38
Gingival Enlargement Management using Diode Laser 940 nm and Conventional Scalpel Technique (A Comparative Study)
...Show More Authors

Diode lasers are becoming popular in periodontal surgery due to their highly absorption by pigments such as melanin and hemoglobin their weak absorption by water and hydroxyapatite makes them safe to be used around dental hard tissues. Objective: The aim of the present study was to evaluate the efficiency of diode laser in performing gingivectomy in comparison to conventional scalpel technique in patients with chronic inflammatory enlargement. Materials and methods: Thirty patients were selected for this study. All of them required surgical treatment of gingival enlargements and were randomly divided into two groups: Control group (treated by scalpel and include sixteen patients) and study group (treated with diode laser 940nm and include fourteen patients). Data collected during and after surgery were compared and statically analyzed. Results: Fifteen male and fifteen female were included in this study with age mean of 26.2. Significant differences were observed in the Gingival Index and bleeding scores in laser group compared to the scalpel group, while no significant differences were found in swelling score and plaque index, The level of significance was set at P≤ 0.05.Conclusion: Diode laser 940nm are beneficial in achieving hemostasis with the improvement of gingival health compared to the scalpel technique.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Building a Management System to Control the Construction Claims in Iraq
...Show More Authors

The paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
American Journal Of Biodiversity
Importance of Conventional Pap Smear Application for Iraqi women health: scientific review
...Show More Authors

A Pap test can identify the pre-cancerous and cancerous problem in the vagina and uterine cervix. Cervical tumour is the easiest gynecologic disease to be diagnosed, treated and prevented using regular screening tests and follow-up. This review aimed to explore the opinion of specialists about cytological changes and the precancerous lesions with Pap smear test and visual inspection of the cervices, also to determine the relationship of this malignancy with demographic characteristics of patients. Results showed that few cervical cancer and pre-cancer were with women in postmenopausal period, but more were with women in the premenopausal period. Visual inspection of the cervix can show erosion lesions by gross inspection. Upon cytology exam

... Show More
View Publication
Publication Date
Wed Jan 15 2020
Journal Name
Biochem. Cell. Arch.
EFFECT OF LYCOPENE ANTIOXIDANT GEL AS ADJUNCTIVE THERAPY TO CONVENTIONAL PERIODONTAL TREATMENT
...Show More Authors

Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Formation Evaluation for Nasiriyah Oil Field Based on The Non-Conventional Techniques
...Show More Authors

The unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:

  • Apparent resistivity Rwa
  • Rxo /Rt

   The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu

... Show More
View Publication Preview PDF
Publication Date
Tue May 07 2024
Journal Name
Hayati Journal Of Biosciences
Histological and Molecular Evaluation of the Antiproliferative Activity of Allium ampeloprasum Water Extract Against Oral Mucosa Cell Line (Gingival Cancer)
...Show More Authors

Gingival carcinoma is a malignant neoplasm affecting the oral mucosa and is associated with significant morbidity and mortality. Allium ampeloprasum var. porrum water extracts have gotten a lot of attention because of their bioactive components, such as polyphenols, flavonoids, and alkaloids, which have a variety of pharmacological activities, including antiproliferative actions. This study aimed to evaluate the histological and molecular effects of Allium ampeloprasum (leek) water extract on the proliferation of the murine gingival cancer cell line. Histological evaluation was conducted to examine morphological changes induced by extract treatment. Molecular mechanisms underlying the observed histological changes were investigated

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
The Iraqi public's uses of digital television and cinema sites ( A field study ): Research extracted from a master's thesis
...Show More Authors

The research problem revolves around the Iraqi public's use of digital television and cinematic websites، and their importance to the academic study and society، as it examines the public's relationship with these websites، usage habits، and the reasons for their interaction with them. And for the prevalence of this phenomenon of use، it was necessary to address the intensity، intentionality، and timing of use to theoretically root the subject of the study، which is one of the modern studies in Iraq and the Arab world. The survey approach، where the research was based on the theory of uses and gratifications that confer positivity and activity on the mass media audience.

     The researchers designed

... Show More
View Publication Preview PDF
Crossref (1)
Crossref