Preferred Language
Articles
/
Jhe3AI4BVTCNdQwC8y1v
Evaluation of the effects of Curcumin gel against Periodontopathic Bacteria (Porphyromonas gingivalis) using real-time time-polymerase chain reaction technology
...Show More Authors

Periodontal disease is typically treated with mechanical debridement of the tooth surface. It may, however, be insufficient to eradicate pathogenic microorganisms on its own. Because of the microbial etiology of periodontitis, systemic or local antibiotic therapy is used as an adjunct treatment. The present study aimed to determine the effects of curcumin gel on Porphyromonas gingivalis. Eleven patients with stage II and III periodontitis were registered in the study. A double-blinded split-mouth design followed. Periodontal pockets were distributed into 2 groups; the test group received scaling and root planing along with curcumin gel, while the control group received scaling and root planing along with a placebo gel. Plaque index, probing pocket depth and relative attachment level were recorded with the collection of subgingival plaque samples at different time intervals for bacterial analysis using real-time time-polymerase chain reaction. Results showed a significant reduction in the bacterial outcomes in the test group. There was a significant improvement in the Plaque index, probing pocket depth and relative attachment level in the test group compared to the control group. On intra-group comparison, both groups showed a significant reduction of Plaque index and probing pocket depth with a more significant reduction in the test group, and only the test group showed a significant reduction of relative attachment level. A strong positive correlation of P.gingivalis with probing pocket depth and relative attachment level in the test group was estimated. Curcumin gel has an antibacterial effect against Porphyromonas gingivalis and showed a potent improvement in the outcomes of the periodontal parameters. Keywords: Curcumin gel, periodontal pocket, Porphyromonas gingivalis

Scopus Crossref
View Publication
Publication Date
Mon Jun 08 1998
Journal Name
Journal Of King Saud University
Moment Capacity and Strength of Reinforced Concrete Members Using Stress- Strain Diagrams of Concrete and Steel
...Show More Authors

Publication Date
Mon Jun 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Research Octane Number Improvement of Iraqi Gasoline by Adsorption of n-Paraffins Using Zeolite Molecular Sieves
...Show More Authors

This study focused on the improvement of the quality of gasoline and enhancing its octane number by the reduction of n-paraffins using zeolite 5A. This study was made using batch and continuous mode. The parameters which affected the n-paraffin removal efficiency for each mode were studied. Temperature (30 and 40 ˚C) and mixing time up to 120 min for different amounts of zeolite ranging (10-60 g) were investigated in a batch mode. A maximum removal efficiency of 64% was obtained using 60 g of zeolite at 30 ˚C after a mixing time 120 min. The effect of feed flow rate (0.3-0.8 l/hr) and bed height (10-20 cm) were also studied in a continuous mode. The equilibrium isotherm study was made using different amounts of zeolite (2-20 g) and the

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Simulation of Temperature Distribution in TIG Spot Welds of (Al-Mg) Alloy Using Finite Element Method
...Show More Authors

      This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type  (5052-O).

      The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented  the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot.   &nbs

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 08 2022
Journal Name
Al-khwarizmi Engineering Journal
Kinetics of Electrochemical Removal of Nickel using Bio-electrochemical Reactor with Packed Bed Rotating Cylinder Cathode
...Show More Authors

The kinetics of nickel removal from aqueous solutions using a bio-electrochemical reactor with a packed bed rotating cylinder cathode was investigated. The effects of applied voltage, initial nickel concentration, the rotation speed of the cathode, and pH on the reaction rate constant (k) were studied. The results showed that the cathodic deposition occurred under mass transfer control for all values of the applied voltage used in this research. Accordingly, the relationship between concentration and time can be represented by a first-order equation. The rate constant was found to be dependent on the applied voltage, initial nickel concentration, pH, and rotation speed. It was increased as the applied voltage increased and decreased as t

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 27 2022
Journal Name
2022 3rd Information Technology To Enhance E-learning And Other Application (it-ela)
Diabetes Prediction Using Machine Learning
...Show More Authors

Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,

... Show More
View Publication
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF