Preferred Language
Articles
/
lBfbYI4BVTCNdQwC4kWg
Bond strength of a new Kevlar fiber-reinforced composite post with semi-interpenetrating polymer network (IPN) matrix
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Potential of Salivary Matrix Metalloproteinase 9 to Discriminate Periodontal health and disease
...Show More Authors

Periodontitis is a chronic inflammatory disease resulted from aggravated immune response to a dysbiotic subgingival microbiota of a susceptible host. Consequences of periodontitis are not only limited to the devastating effect on the oral cavity but extends to affect general health of the individual and also exerts economic burdens on the health systems worldwide. Despite these serious outcomes of periodontitis; however, they are avoidable by early diagnosis with proper preventive measures or non-invasive interventions at earlier stages of the disease. Clinically, diagnosis of periodontitis could be overlooked due to certain limitations of the conventional diagnostic methods such as periodontal charting and radiographs. Utilization of re

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Remediation of Oil Production by Matrix Acidizing Method on an Oil Well
...Show More Authors

   The remediation oil production by matrix acidizing method on the well named "X" (for confidential reasons) is scrutinized in this paper. Initial production of 1150 bpd, production index of 2.8 STB/Psi/d and permeability of 150md, in 2018 two years down the lane this dropped to 450 bpd, production index 0.7 STB/Psi/d. The declined observed on the production index is trouble shouted and after elimination of (no completion damage/perforation damage), the skin is calculated by carrying out a well test (build-up test) whose extrapolation in excel over times gave us a skin of 40.The reservoir heterogeneity, containing >20% of feldspar, carbonates and paraffin’s guided thematrix acidizing design and treatment proposition to remedy thi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the effect of Autolougues Platelet Rich Fibrin Matrix on osseointegration of the titanium implant immunohistochemical evaluation for PDGF-I&IGF-A
...Show More Authors

Background: Platelet-rich fibrin (PRF) is a simple, low cost and minimally invasive way to obtain a natural concentration of autologous growth factors and is currently being widely experimented in different fields of medicine for its ability to aid the regeneration of tissue with a low healing potential. Fields of application are sports medicine, orthopedics, dentistry, dermatology, ophthalmology, plastic and maxillofacial surgery, etc. The rationale for using platelets in so many fields for the treatment of different tissues is because PLTs constitute a reservoir of critical GFs and cytokines, which may govern and regulate the tissue healing process that is quite similar in all kinds of tissues. Materials and Methods: Screw titanium implan

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 25 2021
Journal Name
Dental Materials Journal
Mechanical and thermal stress evaluation of PEEK prefabricated post with different head design in endodontically treated tooth: 3D-finite element analysis
...Show More Authors

View Publication
Scopus (29)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Effect of cation size on electrochemical properties of polymer electrolyte
...Show More Authors

This study investigates the ionic conduction dependence on the size of alkaline cations in gel polymer electrolytes based on double iodide can enhance by incorporating a salt having a bulky cation.

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 03 2021
Journal Name
021 8th International Conference On Computing For Sustainable Global Development (indiacom)
Tilting-rotors Quadcopters: A New Dynamics Modelling and Simulation based on the Newton-Euler Method with Lead Compensator Control
...Show More Authors

Scopus (18)
Scopus
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Sensors And Actuators B: Chemical
Fabrication and Characterizations of a Novel Etched-tapered Single Mode Optical Fiber Ammonia Sensors Integrating PANI/GNF Nanocomposite
...Show More Authors

View Publication
Scopus (40)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Eastern-european Journal Of Enterprise Technologies
Improvement of noisy images filtered by bilateral process using a multi-scale context aggregation network
...Show More Authors

Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref