Preferred Language
Articles
/
jbcd-460
Early detection of periodontitis among young adult cigarette smokers and non-smokers using cone beam computed tomography
...Show More Authors

Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth except the third molar while the radiographic analysis using CBCT was recorded on the Ramfjord teeth, the unit of measurement was from cement-enamel junction to alveolar crest distance (CEJ-Ac distance) per site in millimeters. Results: The results obtained were a non significant difference for PLI, a significant difference of mean of GI between young smokers and non smokers. There was a highly significant difference in the general mean of CEJ-Ac distance between both groups. There was a significant difference between maxillary and mandibular teeth, a non significant difference between right and left sides among young smokers and non smokers. Conclusion: The CBCT device plays an important role in detection the incipient form of periodontitis among young smokers and non-smokers, so we concluded that there is a highly significant difference in the general mean CEJ-Ac distance between young smokers and non smokers with increase distance in the maxillary teeth than that in the mandibular teeth.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
Sensors And Actuators B: Chemical
Sensor and sensor microtiterplate with expanded pH detection range and their use in real samples
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Participation of the Students of the Colleges of Education in the Iraqi Universities in Literacy and Adult Education in Iraq. The Students of the Departments of Holy Quran and Islamic Education (A model)
...Show More Authors

The study focuses on the problem that Iraq is approaching an increasing rate of literacy;the available data refers to a rate of (18% -19%). In addition to the fact that the generalcurrent role of the programs directed to literacy is not actually effective enough to limit the expansion of this rate.

The importance of this study highlights the fact that the Iraqi universities are an important tributary among the tributaries of human development, especially in spreading the education of the voluntary work in literacy field and confirming the connection between the students and their society and their role in solving one of the prominent challenges that face the development, i.e., literacy.

<

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Effect of Temperature and Alcohol on the Determination of Critical Micelle Concentration of Non- Ionic Surfactants in Magnetic Water
...Show More Authors

The determination of critical micelle concentration of selected non-ionic surfactants (Tween 20,40 and 80) have been investigated using magnetic water(MW)as an aqueous medium.Conductometry technique is used to determine critical micelle concentration.The effect of alcohol addition and temperature variation at the range(293.15 -303.15K) are also pursued. It is concluded that the process of micellization is spontaneous and endothermic because of the observed free energy of micellization (ΔGom) , enthalpy change of micellization  (ΔHom), and entropy change of micellization (ΔSom) for the system was also studied.The properties of the non-ionic surfactants were studied, both in absence and presence of

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
The Degree of Using Augmented Reality Technology among students of the Optimum Invesment Project fot Teaching Personnel Program and the difficulties they face at Al-Shaqra University
...Show More Authors

Augmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 4th International Conference On Current Research In Engineering And Science Applications (iccresa)
Noise Detection and Removing in Heart Sound Signals via Nuclear Norm Minimization Problems
...Show More Authors

Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref