Preferred Language
Articles
/
jbcd-460
Early detection of periodontitis among young adult cigarette smokers and non-smokers using cone beam computed tomography
...Show More Authors

Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth except the third molar while the radiographic analysis using CBCT was recorded on the Ramfjord teeth, the unit of measurement was from cement-enamel junction to alveolar crest distance (CEJ-Ac distance) per site in millimeters. Results: The results obtained were a non significant difference for PLI, a significant difference of mean of GI between young smokers and non smokers. There was a highly significant difference in the general mean of CEJ-Ac distance between both groups. There was a significant difference between maxillary and mandibular teeth, a non significant difference between right and left sides among young smokers and non smokers. Conclusion: The CBCT device plays an important role in detection the incipient form of periodontitis among young smokers and non-smokers, so we concluded that there is a highly significant difference in the general mean CEJ-Ac distance between young smokers and non smokers with increase distance in the maxillary teeth than that in the mandibular teeth.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Dec 19 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF MICROBIAL CONTAMINATION IN IMPORTED FROZEN CHICKEN THAT AVAILABLE IN LOCALLY MARKETS: DETECTION OF MICROBIAL CONTAMINATION IN IMPORTED FROZEN CHICKEN THAT AVAILABLE IN LOCALLY MARKETS
...Show More Authors

The study was carried out to study the quality of 7 samples of imported frozen chicken that are available in locally markets. These samples were collected from Baghdad markets in June 2010. The results were showed that the all samples were not content the name of company and batch number one the labeling, while the microbial test refer to found contamination in all samples, but it in the limited of Iraqi standers specification for frozen chicken, also note Staphylococcus aureus in all samples, the samples C1 and C2 have Salmonella ohio, while not observe Coliform bacteria in all samples.

View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Newton-Kantorovich Method for Solving One of the Non-Linear Sturm-Liouville Problems
...Show More Authors

Due to its importance in physics and applied mathematics, the non-linear Sturm-Liouville problems
witnessed massive attention since 1960. A powerful Mathematical technique called the Newton-Kantorovich
method is applied in this work to one of the non-linear Sturm-Liouville problems. To the best of the authors’
knowledge, this technique of Newton-Kantorovich has never been applied before to solve the non-linear
Sturm-Liouville problems under consideration. Accordingly, the purpose of this work is to show that this
important specific kind of non-linear Sturm-Liouville differential equations problems can be solved by
applying the well-known Newton-Kantorovich method. Also, to show the efficiency of appl

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 11 2021
Journal Name
Engineering, Technology & Applied Science Research
Post-Fire Behavior of Non-Prismatic Beams with Multiple Rectangular Openings Monotonically Loaded
...Show More Authors

The main objective of this paper is to study the behavior of Non-Prismatic Reinforced Concrete (NPRC) beams with and without rectangular openings either when exposed to fire or not. The experimental program involves casting and testing 9 NPRC beams divided into 3 main groups. These groups were categorized according to heating temperature (ambient temperature, 400°C, and 700°C), with each group containing 3 NPRC beams (solid beams and beams with 6 and 8 trapezoidal openings). For beams with similar geometry, increasing the burning temperature results in their deterioration as reflected in their increasing mid-span deflection throughout the fire exposure period and their residual deflection after cooling. Meanwhile, the existing ope

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (20)
Scopus Crossref
Publication Date
Sat Dec 11 2021
Journal Name
Engineering, Technology & Applied Science Research
Post-Fire Behavior of Non-Prismatic Beams with Multiple Rectangular Openings Monotonically Loaded
...Show More Authors

The main objective of this paper is to study the behavior of Non-Prismatic Reinforced Concrete (NPRC) beams with and without rectangular openings either when exposed to fire or not. The experimental program involves casting and testing 9 NPRC beams divided into 3 main groups. These groups were categorized according to heating temperature (ambient temperature, 400°C, and 700°C), with each group containing 3 NPRC beams (solid beams and beams with 6 and 8 trapezoidal openings). For beams with similar geometry, increasing the burning temperature results in their deterioration as reflected in their increasing mid-span deflection throughout the fire exposure period and their residual deflection after cooling. Meanwhile, the existing ope

... Show More
Crossref (20)
Crossref
Publication Date
Sun Jan 23 2022
Journal Name
Buildings
Structural Efficiency of Non-Prismatic Hollow Reinforced Concrete Beams Retrofitted with CFRP Sheets
...Show More Authors

Non-prismatic reinforced concrete (RC) beams are widely used for various practical purposes, including enhancing architectural aesthetics and increasing the overall thickness in the support area above the column, which gives high assurance to services that this will not result in the distortion of construction features and can reduce heights. The hollow sections (recess) can also be used for the maintenance of large structural sections and the safe passage of utility lines of water, gas, telecommunications, electricity, etc. They are generally used in large and complex civil engineering works like bridges. This study conducted a numerical study using the commercial finite element software ANSYS version 15 for analysing RC beams, hol

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Buckling Analysis Of Damaged Composite Plates Under Uniform Or Non-Uniform Compressive Load
...Show More Authors

The present study focused mainly on the buckling behavior of composite laminated plates subjected to mechanical loads. Mechanical loads are analyzed by experimental analysis, analytical analysis (for laminates without cutouts) and numerical analysis by finite element method (for laminates with and without cutouts) for different type of loads which could be uniform or non-uniform, uniaxial or biaxial. In addition to many design parameters of the laminates such as aspect ratio, thickness ratio, and lamination angle or the parameters of the cutout such as shape, size, position, direction, and radii rounding) which are changed to studytheir effects on the buckling characteristics with various boundary conditions. Levy method of classical lam

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
The International Tinnitus Journal
Does the Location of a Small Tympanic Membrane Perforation Affect the Degree of Hearing Loss in Adult Patients with Inactive Mucosal Chronic Suppurative Otitis Media?
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Feb 20 2026
Journal Name
Journal Of Physical Education
Platform proposal impact in the development of some special physical abilities in the level of achievement of ran (1500) meters of the young players in athletics.
...Show More Authors

View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref