Preferred Language
Articles
/
jbcd-2574
The effect of 2 different techniques in second stage implant surgery
...Show More Authors

Background: Dental implant is one of the most important options for teeth replacement. In two stage implant surgery, a few options could be used for uncovering implants, scalpel and laser are both considered as effective methods for this purpose. The Aim of the study: To compare soft tissue laser and scalpel for exposing implant in 2nd stage surgery in terms of the need for anesthesia, duration of procedure and pain level assessment at day 1 and day 7 post operatively using visual analogue scale . Materials and methods: Ten patients who received bilateral implants participated after healing period completed, gingival depth over each implant was recorded and then implant(s) were exposed by either scalpel or laser with determination for the need of anesthesia. Duration of the procedure was calculated in each case and post-operative pain was assessed by Visual analogue scale at day 1 and day 7. Results: Statistically significant difference in the need of anesthesia was found. A non-significant difference in the duration of the operation was found between the two methods. Non-significant difference was found between the two methods regarding post-operative pain at day 1, with the day 7 scores "no pain or zero pain score" in all the cases by the two methods. A directional significant correlation was found between depth of the gingival tissue over the implants and duration of the procedures regardless of the method used. Conclusion: diode laser can be used effectively for uncovering implants, providing both the dentist and the patient with additional advantages over the conventional methods. Although there was insignificant difference in pain scoring, however implant exposure by laser was more preferred by the patients.

Scopus Crossref
View Publication
Publication Date
Thu Sep 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Different Methods of Canine Retraction- Part 1
...Show More Authors

Background: This review aimed at explaining different methods of canine retraction along the archwire. Methods: Searching for different methods of canine retraction using fixed orthodontic appliances was carried out using different databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and hand searching from 1930 till February 2022. Results: After excluding the duplicate articles, papers describing the methods of canine retraction along the archwires were included. The most commonly used methods are NiTi closed coil spring and elastic chain. Conclusions: Various methods of canine retraction along the archwires were explained in detail regarding their adv

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Removal of Water Turbidity by Different Coagulants
...Show More Authors

During the last decade, there has been a concern about the relation between aluminum residuals in treated water and Alzheimer disease, and more interest has been considered on the development of natural coagulants. The present study aimed to investigate the efficiency of alum as a primary coagulant in conjunction with mallow, Arabic gum and okra as coagulant aids for the treatment of water samples containing synthetic turbidity of kaolin. Jar test experiments were carried out for initial raw water turbidities 100, 200 and 500 (NTU). The optimum doses of alum, mallow, Arabic gum and okra were 20, 2, 1 and 1 mg/L for100 NTU turbidity level, 35, 4, 2 and 3 mg/L , for 200NTU turbidity level and 50, 8, 10 and 8 mg/L for 500 NTU turbidity leve

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Mar 21 2014
Journal Name
International Journal Of Antennas And Propagation
Development of a Compact Wide-Slot Antenna for Early Stage Breast Cancer Detection Featuring Circular Array Full-View Geometry
...Show More Authors

A novel planar type antenna printed on a high permittivity Rogers’ substrate is proposed for early stage microwave breast cancer detection. The design is based on a p-shaped wide-slot structure with microstrip feeding circuit to eliminate losses of transmission. The design parameters are optimized resulting in a good reflection coefficient at −10 dB from 4.5 to 10.9 GHz. Imaging result using inhomogeneous breast phantom indicates that the proposed antenna is capable of detecting a 5 mm size cancerous tumor embedded inside the fibroglandular region with dielectric contrast between the target and the surrounding materials ranging from 1.7 : 1 to 3.6 : 1.

Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Effects of sulpher foam and mycorrhizal fungi on Eggplant infested with Nematode(Meloidogyne javanica) at seed or seedling stage
...Show More Authors

Arbuscular mycorrhizal fungi and sulphur foam added either at direct seeding or at transplanting decreased the effects of nematode (Meloidogyne javanica) on eggplant growth, and improved plant health. Experiments were conducted to study the possible interactions between the Mycorrhizal fungi (Glomus mossae and Gigaspora spp.) and sulphur foam to control M. javanica on eggplant at seed or seedling stage. Experiment at seed stage treated with Mycorrhiza or sulphur foam alone or together stimulated the growth and reduced Nematode infestation significantly. Treated plant at seedling stage increased plant growth and reduced the number of galls /gm of root system. The interaction between Mycorrhiza and sulpher foam treatments was not significant

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
The study of the effect of the use of programming in the linear programming model (applied study)
...Show More Authors

The parametric programming considered as type of sensitivity analysis. In this research concerning to study the effect of the variations on linear programming model (objective function coefficients and right hand side) on the optimal solution. To determine the parameter (θ) value (-5≤ θ ≤5).Whereas the result، the objective function equal  zero and the decision variables are non basic، when the parameter (θ = -5).The objective function value increases when the parameter (θ= 5) and the decision variables are basic، with the except of X24, X34.Whenever the parameter value increase, the objectiv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
The role of annealing temperature on the optical energy gap and Urbach energy of Se:2%Sb thin films
...Show More Authors

The optical energy gap(Eopt) and the width of the tails of localized states in the band gap (?E) for Se:2%Sb thin films prepared by thermal co-evaporation method as a function of annealing temperature are studied in the photon energy range ( 1 to 5.4)eV.Se2%Sb film was found to be indirect transition with energy gap of (1.973,2.077, 2.096, 2.17) eV at annealing temperature (295,370,445,520)K respectively. The Eopt and ?E of Se:2%Sb films as a function of annealing temperature showed an increase in Eopt and a decrease in ?E with increasing the annealing temperature. This behavior may be related to structural defects and dangling bonds.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 26 2019
Journal Name
Journal Of Contemporary Medical Sciences
Breast Cancer Decisive Parameters for Iraqi Women via Data Mining Techniques
...Show More Authors

Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Nov 19 2023
Journal Name
Aip Conference Proceedings
Designing a database for a three dimensional model using geomatics techniques
...Show More Authors

View Publication Preview PDF
Scopus Crossref