Preferred Language
Articles
/
BBhpcpUBVTCNdQwCRS7A
Biological Assessment, Heamatological Study, and Environmental Detection of Eugenol
...Show More Authors

Eugenol is found in essential oils of many plants. It belongs to a class of naturally occurring phenolic monoterpenoids, chemically it is an allyl chain-substituted guaiacol. A study was conducted on the compound of Eugenol, which included different studies. The first study was the determination of eugenol in body fluid, which includes serum, saliva and urine has been found the highest concentration was in urine then serum and saliva. The second study was the hematological study. Complete blood count was accomplished on the volunteers alredy administrated with eugenol contained mouthwash the analysis was accomplished before and after the mouth wash use. The result observed a slightly negative results and was not that significant, which confirms the strict blood system to resist the toxicity of the compound or the fact that the time period of giving was short.The third study included a histological study on the effect of this compound on the tissues of the animal body by conducting experiments on albino male albino male mice. The side effects were found after 10 days of rat infusion, with yellow spots on the skin and hepatomegaly. The fourth study was the environmental analyses and the effect of this compound on the environment. The eugenol was stable and persistent in water and had found of 11 mg/L concentration in the main tank of wastewater for the dental hospital swage.

Crossref
View Publication
Publication Date
Mon Nov 17 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of serum and salivary oxidant and total antioxidant status of patients with recurrent aphthous stomatitis in a sample of Basrah city
...Show More Authors

Background: Recurrent Aphthous Stomatitis (RAS) is the most common painful oral mucosal disease, affecting approximately 20% of the population. RAS presents with a wide spectrum of severity ranging from a minor nuisance to complete debility. Many of factors thought to have been involved in its etiology; that might have at the same time a direct or indirect impact upon oxidant/antioxidant system and trigger free radicals production. The aim of this study was to determine the possible association of oxidant/total antioxidant status and recurrent aphthous stomatitis (RAS). Subjects, materials and methods: The study consisted of thirty patients with recurrent aphthous stomatitis and thirty healthy controls from which saliva and blood samples we

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Biochemical & Cellular Archives
Assessment of uric acid in patients of end-stage renal disease with hypertension and diabetic nephropathy and the risk of cardiovascular diseases
...Show More Authors

The relationship of hyperuricemia to kidney disease, diabetes, hypertension and the risk of cardiovascular diseases remain controversial. The aim of this study is to evaluate the use of uric acid (UA) levels to find the higher risk of cardiovascular disease (CVD) in patients with end stage renal disease that have diabetic nephropathy (DN), nephropathy with hypertension (NH) and patients with both diabetic nephropathy with hypertension (DNH). This study deals with 115 patients with end-stage renal disease under hemodialysis sub-grouped into 35 patients with (DN), 40 patients with (NH), and 40 patients with (DNH). Some biochemical parameters were determined in the serum of all participants such as HbA1c, fasting blood glucose (FBG), UA, urea,

... Show More
Scopus (1)
Scopus
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Fri Nov 15 2024
Journal Name
Scientific Reports
Ag@WO3 core–shell nanocomposite for wide range photo detection
...Show More Authors

This study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The ph

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Apr 05 2025
Journal Name
2025 Ieee 4th International Conference On Computing And Machine Intelligence (icmi)
From Pixels to Diagnosis: AI-Powered CNN for Pneumonia Detection
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Minimum Spanning Tree Algorithm for Skin Cancer Image Object Detection
...Show More Authors

This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that

... Show More
View Publication Preview PDF