Preferred Language
Articles
/
jbcd-600
Evaluation of maxillary sinus septal type and height in partially edentulous maxilla using spiral computed tomography
...Show More Authors

Background: The presence of anatomic variations within the maxillary sinus such as septa has been reported to increase the risk of sinus membrane perforation during sinus elevation procedure for implant placement. This study aimed to measure the septal heights and correlate it with different types of septa. Material and methods: Thirty patients (15 males and 15 females) with partially edentulous maxillae and mean age (35) years were enrolled in this study. Sixty sinuses scanned with Spiral multislice Computed Tompgraphy, septal height measured after evaluation of septal type whether it was primary or secondary. Results: The results showed that 72.5 % of the septa detected were primary and this is statistically significant when compared with the percentage of secondary type (27.5%). There was a statistically significant difference in the height of septa between the two types, and the primary septa were higher. There was no significant difference between septal type and sex. Conclusions: A sound knowledge of maxillary sinus anatomy and anatomic variations such as septa is essential to prevent complication during surgical interventions involving this region.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Biofilm formation rate measurement in water and biomedical systems using photometric smartphones applications
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Concrete strength development by using magnetized water in normal and self-compacted concrete
...Show More Authors
Abstract<p>The main objective of this work was to adopt an environmentally friendly technology with enhanced results. The technology of magnetic water (MW) treatment system can be used in concrete mixture production instead of potable water (PW) to improve both workability and strength. Two types of concrete were adopted: normal concreter production with two grades 25 and 35 MPa and the self-compacted concrete (SCC) with 35 MPa grade. The concrete mixes containing MW instead of PW results showed that, for 25 MPa grade, an improvement in a compressive strength of 15.1, 14.8, and 10.2% was achieved for 7, 28, and 90 days, respectively. For 35 MPa grade, an improvement of 13.6, 11.5, and </p> ... Show More
View Publication
Scopus (5)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Concrete strength development by using magnetized water in normal and self-compacted concrete
...Show More Authors
Abstract<p>The main objective of this work was to adopt an environmentally friendly technology with enhanced results. The technology of magnetic water (MW) treatment system can be used in concrete mixture production instead of potable water (PW) to improve both workability and strength. Two types of concrete were adopted: normal concreter production with two grades 25 and 35 MPa and the self-compacted concrete (SCC) with 35 MPa grade. The concrete mixes containing MW instead of PW results showed that, for 25 MPa grade, an improvement in a compressive strength of 15.1, 14.8, and 10.2% was achieved for 7, 28, and 90 days, respectively. For 35 MPa grade, an improvement of 13.6, 11.5, and </p> ... Show More
Crossref (7)
Crossref
Publication Date
Sun Dec 17 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Prediction Using Artificial Neural Network of Bed Porosity and Solid Holdup in Viscous 3-Phase Inverse Fluidization
...Show More Authors

In the present investigation, bed porosity and solid holdup in viscous three-phase inverse fluidized bed (TPIFB) are determined for aqueous solutions of carboxy methyl cellulose (CMC) system using polyethylene and polypropylene as  a particles with low-density and diameter (5 mm) in a (9.2 cm) inner diameter with height (200 cm) of vertical perspex column. The effectiveness of gas velocity Ug , liquid velocity UL, liquid viscosity μL, and particle density ρs on bed porosity BP and solid holdups εg were determined. The bed porosity increases with "increasing gas velocity", "liquid velocity", and "liquid viscosity". Solid holdup decreases with increasing gas, liquid

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Sensors And Actuators B: Chemical
Sensitive and simple colorimetric methods for visual detection and quantitative determination of semicarbazide in flour products using colorimetric reagents
...Show More Authors

After baking the flour, azodicarbonamide, an approved food additive, can be converted into carcinogenic semicarbazide hydrochloride (SEM) and biurea in flour products. Thus, determine SEM in commercial bread products is become mandatory and need to be performed. Therefore, two accurate, precision, simple and economics colorimetric methods have been developed for the visual detection and quantitative determination of SEM in commercial flour products. The 1st method is based on the formation of a blue-coloured product with λmax at 690 nm as a result of a reaction between the SEM and potassium ferrocyanide in an acidic medium (pH 6.0). In the 2nd method, a brownish-green colored product is formed due to the reaction between the SEM and phosph

... Show More
View Publication
Crossref (27)
Crossref
Publication Date
Sat Feb 14 2015
Journal Name
Global Journal Of Advanced Engineering Technologies And Sciences
EVALUATION OF ANTIBACTERIAL ACTIVITY OF METAL NANOPARTICLES AGAINST DIFFERENT PATHOGENIC BACTERIA
...Show More Authors

In recent years, infectious diseases are increasingly being encountered in clinical settings. Due to the development of antibiotic resistance and the outbreak of these diseases caused by resistant pathogenic bacteria, the pharmaceutical companies and the researchers are now searching for new unconventional antibacterial agents. Recently, in this field, the application of nanoparticles is an emerging area of nanoscience and nanotechnology. For this reason, nanotechnology has a great deal of attention from the scientific community and may provide solutions to technological and environmental challenges. A common feature that these nanoparticles exhibit their antimicrobial behavior against pathogenic bacteria. In this report, we evaluate

... Show More
Preview PDF