Preferred Language
Articles
/
jbcd-1513
Efficacy of Papacarie in Reduction Total Bacterial Count in Comparison with the Conventional Rotary Method
...Show More Authors

Background: The change in the concepts of cavity preparation and the development of reliable adhesive materials lead to the development of alternative methods of caries removal. Chemo-mechanical caries removal (CMCR) involves the chemical softening of carious dentin, followed by its removal with manual excavation. The present study was conducted to evaluate clinically the efficiency of caries removal using a new chemo-mechanical agent (Papacarie) compared to the conventional drilling method in reduction of total bacterial count. Material and methods: The study is a split mouth design. The sample composes from sixty mandibular deciduous molars teeth in thirty children, between six to nine years of age with bilateral class I deep occlusal carious lesions without pulp involvement. Samples of this study were classified into group A and B with thirteen teeth for each. In groupAtreatment by Papacárie while group B were treated by the conventional drilling method Results: The results showed significant different in total bacterial count in period after treatment with Papacarie as comparative with drill method for caries remove. Conclusions: It was concluded that Papacarie could be an effective caries removal method to treat children, particularly those who present with early childhood caries or management problems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 25 2021
Journal Name
International Journal Of Drug Delivery Technology
A comparative study of retinol-binding protein-4 and progranulin in iraqi women with thyroid disorder
...Show More Authors

Thyroid hormones (TH) regulate the metabolic processes required for normal development and growth; also, to organizemetabolism in adults, any defect in thyroid function leads to abnormality in thyroid hormones level. The current study hasbeen designed to find the relationship between retinol-binding protein-4 and progranulin in the serum of Iraqi women withhypothyroidism and hyperthyroidism, also, to study whether these patients are exposed to a risk of developing diabetes mellitus,and PGRN may be a biomarker in detection early stage of diabetes mellitus.Materials and Methods: in this study, serum samples were obtained from 50 Iraqis women patients, [25 patients withhypothyroidism (G2) and 25 patients with hyperthyroidism (G3)] in addition

... Show More
Scopus (3)
Scopus
Publication Date
Thu Feb 01 2018
Journal Name
Applied Energy
Solidification enhancement of PCM in a triplex-tube thermal energy storage system with nanoparticles and fins
...Show More Authors

View Publication
Scopus (300)
Crossref (284)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The invention in the criticism of the Andalusian Muwashah
...Show More Authors

The research has arrived to the following results:
1. There were critical views that accompanied the beginnings of (Muwashah). These
views were derived from literary criticism that handled the ancient Arabic poetry, especially
its kinds that were concerned with artificiality in addition to the views based on rivalry
among makers of (Muwashah) in front of the audience so as to judje who is the best
according to artistic response.
2. There existed new critical views, their originality was shown through the new critical
theories that appeared especially those concerned with receiving the text and reading theory.
3. The Muwashah was one of the most important poetic arts that reproduced previous
text, not in the tra

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
This study sought to determine the impact of spreading the culture of quality in improving the quality of tourism service in some hotels in Erbil governorate
...Show More Authors

This study sought to determine the impact of spreading the culture of quality in improving the quality of tourism service in some hotels in Erbil governorate. The theme of excellence in providing service and attention to it has become the concern of most organizations in general and tourism service organizations in particular. Tourists try to establish the mental status of customers about their tourism organizations had to pay attention to the quality of service provided to the customer and work to develop them to the advanced stages of satisfaction and happiness of customers and this will certainly positively affect the improvement of service in the tourism sector, Of the research variables were examined statistically by distrib

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Percentage of Availability of the Elements of Citizenship Concept in the Guides for Teachers of Musical Skills in the Sultanate of Oman
...Show More Authors

Abstract

This research aims to identify the availability of the elements of the concept of citizenship, to identify the distribution ratios of the outputs of the musical skills curriculum at the levels of educational goals associated with the elements of the concept of citizenship in the guides of teachers of musical skills for grades (12-1) in the Sultanate of Oman. A content analysis card was designed to include the teacher’s guides of musical skills for grades (12-1), which included the outputs, according to the grades with the identification of the elements of citizenship (identity, belonging, rights, participation). The results of the research revealed that the percentage of inclusion of citizenship values

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Carbon Nanotubes: Synthesis via Flame Fragment Deposition (FFD) Method from Liquefied Petroleum Gas
...Show More Authors

The current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref