Preferred Language
Articles
/
r0KlTJsBMeyNPGM3xNnK
The Intersection of AI and the Internet of Things (IoT): Transforming Data into Intelligence
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Jan 06 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Localization of transforming growth factor-beta expression in the peri-implant tissues of dental implants coated with placental collagen
...Show More Authors

Back ground : The transforming growth factor beta (TGFB) signaling pathway is involved in many cellular processes in both the adult organism and the developing embryo including cell growth, cell differentiation, apoptosis. The interaction between implant material and surrounding tissues is believed to play a fundamental role in implant success and illustrates different expression of growth factors by different cells that involved in the formation of peri-implant tissue. The aim of this study was to localize expression of TGF B by newly formed bone tissue around surface-conditioned implants with placental collagen at different time intervals: 3 ,7,14,28, and 56 days . Materials and Methods: Commercially pure Titanium (CPTi) implants coated w

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 05 2023
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Past Myocardial Infarctions and Gender Predict the LVEF Regardless of the Status of Coronary Collaterals: An AI-Informed Research
...Show More Authors

BACKGROUND: The degree of the development of coronary collaterals is long considered an alternate – that is, a collateral – source of blood supply to an area of the myocardium threatened with vascular ischemia or insufficiency. Hence, the coronary collaterals are beneficial but can also promote harmful (adverse) effects. For instance, the coronary steal effect during the myocardial hyperemia phase and that of restenosis following coronary angioplasty. OBJECTIVES: Our study explores the contribution of coronary collaterals – if any exist – while considering other potential predictors, including demographics and medical history, toward the left ventricular (LV) dysfunction measured through the LV ejection fraction (LVEF). METH

... Show More
View Publication
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
Changing the Wine into Vinegar
...Show More Authors

Changing the Wine into Vinegar

View Publication Preview PDF
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
The jender and how it transformed into the Islamic world
...Show More Authors

يتناول هذا البحث دراسة واحدة من المفاهيم المهمة الوافدة الى المجتمع الاسلامي، بعد أن تطور في بيئة غربية وتبنته حركة نسوية متطرفة، تدعو الى مركزية الأنثى والعداء للرجل والأسرة النمطية، إنتقل هذا المصطلح الى المجتمع الإسلامي بعد أن تبنته أجندة عالمية تحاول وباستمرار طمس معالم الفطرة الإنسانية وتغير هوية الشعوب.

View Publication Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The aesthetics of employing the Cap Cut program in the montage and effects of digital content on the Internet
...Show More Authors

Traditional programs and the tedious and financially costly processes they require are no longer the best choice for content makers. The continuous development and development have led to the emergence of competitive software that offers capabilities that are more suitable for aesthetic needs, as it breaks down stereotypical frameworks from the familiar to the unfamiliar to be more suitable for graphic subjects in terms of dealing with the requirements of the digital content industry. Video for communication platforms, as it has more advantages than traditional software and the flexibility and high quality it offers at the level of the final product, All of this contributed to supplementing the image with aesthetic employments with data

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2019
Journal Name
Journal Of The College Of Education For Women
The Effect use of the Internet in Academic Libraries A Case Study
...Show More Authors

The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.

View Publication Preview PDF
Publication Date
Tue Nov 22 2022
Journal Name
College Of Islamic Sciences
The issues of illusion to Ibn hisham AI- Ansari( H 761T) on grammarian
...Show More Authors

This research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.

View Publication Preview PDF