Preferred Language
Articles
/
FxcxlJIBVTCNdQwCSLhz
Preferences of treatments and materials used in the management of exposed pulps: a web-based questionnaire study

Scopus Crossref
View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Popular naming for goods and materials in the Iraqi slang "A Semantic Study"

The current research is concerned with the prices of Goods and materials in the Iraqi slang a descriptive, lexicographic , and semantic study expressing the meanings of these names and their positions , as well as expressing the imaginations of Human mind , the popular mind in describing these goods with evaluating them besides the semantic of each word accordingly
The current research is divided into two parts , the first part is consisted of Vocalizations" words" That are arisen through cognitive naming that concentrate on the mental imaginations for the most important and sensitive such as colors , taste , shapes and forms impacts of Goods and materials according to users' ' taste for those words , on other hand, the second part of

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Measurement of the radioactivity in raw materials used in the ceramic industry in AL-Ramadi ceramic factory using (HPGe) detector

In this research, we have measured specific activity concentrations in five samples for raw materials used in ceramic industry in AL-Ramadi ceramic factory by using (HPGe) detector. The results have shown that, the average specific activity, for 238U, 232Th and 40K are equal to (18.300±6.4 Bq/kg), (17.988±6.1 Bq/kg), (167.952±63.5 Bq/kg), respectively.  In order to assess the radiological hazards of the radioactivity in samples, radium equivalent activity, absorbed gamma dose rate, indoor and outdoor annual effective dose rates, gamma Index and both (external and internal) hazard effects have been calculated. All results were found to be less than the allowed global limit given by (UNSCEAR, 2000).

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Academy Of Accounting And Financial Studies Journal
Scopus (7)
Scopus
View Publication
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
Scopus
View Publication Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of surface treatments and thermocycling on shear bond strength of various artificial teeth with different denture base materials

Background: Separation and deboning of artificial teeth from denture bases present a major clinical and labortory problem which affect both the patient and the dentist. The optimal bond strength of artificial teeth with denture base reinforced with nanofillers and flexible denture bases and the effect of thermo cycling should be evaluated. This study was conducted to evaluate and compare the shear bond strength of artificial teeth (acrylic and porcelain) with denture bases reinforced by 5% Zirconium oxide nanofillers and flexible bases under the effect of different surface treatments and thermo cycling and comparing the results with conventional water bath cured denture bases. Material and methods: Two types of artificial teeth; acrylic and

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 18 2022
Journal Name
World Bulletin Of Public Health (wbph)
WASTEWATER TREATMENTS: A REVIEW

Many water supplies are now contaminated by anthropogenic sources such as domestic and agricultural waste, as well as manufacturing activities, the public's concern about the environmental effects of wastewater contamination has grown. Several traditional wastewater treatment methods, such as chemical coagulation, adsorption, and activated sludge, have been used to eliminate pollution; however, there are several drawbacks, most notably high operating costs, because of its low operating and repair costs, the usage of aerobic waste water treatment as a reductive medium is gaining popularity. Furthermore, it is simple to produce and has a high efficacy and potential to degrade pollu

... Show More
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
The preferences of planning bridges of Al-Mosul city post war

The study started from the problems of wars and the damage that result from deterioration and destruction of infrastructure and the absence of planning and urban reconstruction. The study aims to address the condition of the bad destroyed bridges that have paralyzed traffic from the right and left sides of the city of Mosul. The study is based on the assumption that the reconstruction of bridges will improve the transportation network in the city of Mosul. The study relied on several approaches, including: the historical approach by reviewing global and local experiences and the descriptive approach to review the reality of the state of Mosul after the liberation process, through maps and the analytical approach through statistics and da

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fog-based Spider Web Algorithm to Overcome Latency in Cloud Computing

The cloud-users are getting impatient by experiencing the delays in loading the content of the web applications over the internet, which is usually caused by the complex latency while accessing the cloud datacenters distant from the cloud-users. It is becoming a catastrophic situation in availing the services and applications over the cloud-centric network. In cloud, workload is distributed across the multiple layers which also increases the latency. Time-sensitive Internet of Things (IoT) applications and services, usually in a cloud platform, are running over various virtual machines (VM’s) and possess high complexities while interacting. They face difficulties in the consolidations of the various applications containing heterog

... Show More
Scopus (6)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Oct 15 2023
Journal Name
Bionatura
Examining how PMMA and polyamide denture base materials' physical characteristics are affected by electrolyzed water used as a denture cleaner

Denture cleansing is an essential step that can stop cross‑contamination and adds to the health of the patient, denture durability, and the general quality of life. A disinfection technique must be practical and devoid of damaging effects on the material's properties used to construct the denture base. The main aim of this study is to evaluate the effect of three concentrations of electrolyzed water denture cleanser on heat cure acrylic and polyamide after immersion in electrolyzed water. The evaluation is based on their efficacy on surface hardness, wettability, and color stability compared with one submerged in distilled water as a control group. The method consists of eighty samples of heat-cured acrylic and polyamide material.

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF