Preferred Language
Articles
/
DxYuFIcBVTCNdQwC3jU3
Study the use of Nano-limestone and Egg-shell Ash in Eco-friendly SCC: an Experimental and Statistical Evaluation Based on Computer Programming
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed May 01 2024
Journal Name
Journal Of Engineering
Orbital Prosthesis Rehabilitation in Biomedical Engineering by Means of Computer Vision-Photogrammetry and 3D Prototyping
...Show More Authors

Eye loss may be caused as a result of eye trauma, accidents, or malignant tumors, which leads the patient to undergo surgery to remove the damaged parts. This research examines the potential of computer vision represented by Structure from Motion (SfM) photogrammetry in fabricating the orbital prosthesis as a noninvasive and low-cost technique. A low-cost camera was used to collect the data towards extracting the dense 3D data of the patient facial features following Structure from Motion-Multi View Stereo (SfM-MVS) algorithms. To restore the defective orbital, a Reverse Engineering (RE) based approach has been applied using the similarity RE algorithms based on the opposite healthy eye to rehabilitate the defected orbital precisely

... Show More
View Publication
Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Effect of Long Term use of Glibenclamide on Serum and Urinary Sodium and Potassium Level in Type 2 DM Patients
...Show More Authors

         Long-term use of sulfonylureas including chlorpropamide, is known to potentiate the antidiuretic action of arginine vasopressin (AVP), predisposing to hyponatremia.The present study was designed to evaluate the effect of long term use of glibenclamide on serum and urinary levels of sodium and potassium in Type 2 DM patients in Iraqi DM centers. Ninety eight patients with Type 2 DM who were maintained on different doses of glibenclamide for at least 1 year, attending the centre for Diabetes and Endocrinology in Al-Rusafa, Baghdad, were enrolled in the study, in addition to 15 normal healthy subjects. Patients were allocated into three groups according to the dose of glibenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Legal Sciences
Legal Protection of Computer Programs
...Show More Authors

Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer

... Show More
Preview PDF
Crossref
Publication Date
Thu Mar 16 2017
Journal Name
Journal Of Translation Studies
Problems of Translating Computer Collocations
...Show More Authors

Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
Judge's Preaching to the Litigants and Witnesses An Applied Doctrinal Study on Judicial Decisions of Saudi Courts
...Show More Authors

Abstract

Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,

This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Heliyon
The influence of pulse duration and exposure time of Er,Cr:YSGG laser on lithium disilicate laminate debonding, an in vitro study
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Apr 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of different finishing and polishing systems on surface roughness of new low polymerized composite materials (An in vitro study)
...Show More Authors

Background: Prophylaxis methods are used to mechanically remove plaque and stain from tooth surfaces; such methods give rise to loss of superficial structure and roughen the surface of composites as a result of their abrasive action. This study was done to assess the effect of three polishing systems on surface texture of new anterior composites after storage in artificial saliva. Materials and methods: A total of 40 Giomer and Tetric®N-Ceram composite discs of 12 mm internal diameter and 3mm height were prepared using a specially designed cylindrical mold and were stored in artificial saliva for one month and then samples were divided into four groups according to surface treatment: Group A (control group):10 specimens received no surfa

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Similar judgments in the sacred heavenly books (Quran and the Bible): An analytical study
...Show More Authors

The research tagged with (similar rulings in the holy heavenly books - the Holy Qur’an and the Bible) highlights that there are a number of rulings in the heavenly books that are similar to each other in terms of content, meaning and significance and did not change from one prophet to another because they relate to the basic interests on which social relations are built. Documenting ties, preserving rights, preventing abuse, etc. These are among the divine purposes in clarifying rulings in order to reach their goals and achieve their goals. Therefore, by combining these rulings, many problems and incidents that are the subject of disagreement and doubt between the two religions can be achieved and addressed. Those who want reform, righ

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (16)
Crossref (9)
Scopus Crossref