Preferred Language
Articles
/
QReHwpEBVTCNdQwCEZq6
Efficacy of Autogenous Dentin Biomaterial on Alveolar Ridge Preservation: A Randomized Controlled Clinical Trial
...Show More Authors

Background. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups. The control group had spontaneous healing of extraction sockets. The study group had their extraction sockets filled with autogenous dentin biomaterial after processing their extracted retained roots with the KometaBio device. Standardized cone beam computed tomography (CBCT) scans were repeated four months later. A full‐thickness mucoperiosteal flap reflection was achieved under local anesthesia to get core biopsies for histomorphometric analysis, and dental implants were placed at the same session. Results. A total of 32 eligible patients were included in this study (n = 16 in each group). Both groups had significantly higher facial soft tissue thickness after four months than baseline (p < 0.05). However, the study group showed statistically significant lesser dimensional changes than the control group according to the standardized CBCT scans. Furthermore, core biopsies confirmed an excellent remodeling of the autogenous dentin biomaterial in the study group. In comparison, only new thin bone trabeculae‐filled sockets were in the control group. Conclusion. Autogenous dentin graft can be safely and successfully used for alveolar ridge preservation. Optimal graft remodeling histologically, better ridge dimensional stability, and uneventful wound healing support its clinical application. This trial is registered with TCTR20220615002.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Exploring Important Factors in Predicting Heart Disease Based on Ensemble- Extra Feature Selection Approach
...Show More Authors

Heart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
...Show More Authors

In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
High Transaction Rates Performance Evaluation for Secure E-government Based on Private Blockchain Scheme
...Show More Authors

 

The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
Stability And Data Dependence Results For The Mann Iteration Schemes on n-Banach Space
...Show More Authors

Let  be an n-Banach space, M be a nonempty closed convex subset of , and S:M→M be a mapping that belongs to the class  mapping. The purpose of this paper is to study the stability and data dependence results of a Mann iteration scheme on n-Banach space

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Generating dynamic S-BOX based on Particle Swarm Optimization and Chaos Theory for AES
...Show More Authors

Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm  in order to remove these weakness points, Will be generated dynamic substitution box (S-B

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Arabic Handwriting Word Recognition Based on Scale Invariant Feature Transform and Support Vector Machine
...Show More Authors

Offline Arabic handwritten recognition lies in a major field of challenge due to the changing styles of writing from one individual to another. It is difficult to recognize the Arabic handwritten because of the same appearance of the different characters.  In this paper a proposed method for Offline Arabic handwritten recognition. The   proposed method for recognition hand-written Arabic word without segmentation to sub letters based on feature extraction scale invariant feature transform (SIFT) and   support vector machines (SVMs) to enhance the recognition accuracy. The proposed method  experimented using (AHDB) database. The experiment result  show  (99.08) recognition  rate.

View Publication Preview PDF
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Biochemical Study on Pleural Effusion Fluid in Tuberculous and non-Tuberculous in Iraqi Patients
...Show More Authors

Seventy exudative lymphocytic pleural fluid specimens of patients with suspected tuberculous pleural effusion submitted to the National Reference Laboratory of tuberculosis/Baghdad from October 2012 to February 2013. These effusions were due to tuberculosis pleuritis (n=12) and non-tuberculosis pleuritis (n=58). The following parameters were analyzed: protein concentration, glucose concentration, lactate dehydrogenase (LDH) concentration and adenosine deaminase activity (ADA). As a result, the protein concentration was higher in TPE patients (8.80 ± 0.89 g/dl) than it's concentration in non-TPE patients (7.61 ± 0.54 g/dl), as well as LDH concentration was (3366.58 ± 284.28 U/L) in TPE patients and (3024.12 ± 116.84 U/L) in non-TPE pa

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Proposed Handwriting Arabic Words classification Based On Discrete Wavelet Transform and Support Vector Machine
...Show More Authors

A proposed feature extraction algorithm for handwriting Arabic words. The proposed method uses a 4 levels discrete wavelet transform (DWT) on binary image. sliding window on wavelet space and computes the stander derivation for each window. The extracted features were classified with multiple Support Vector Machine (SVM) classifiers. The proposed method simulated with a proposed data set from different writers. The experimental results of the simulation show 94.44% recognition rate.

View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
On Finitely Null-additive and Finitely Weakly Null-additive Relative to the σ–ring
...Show More Authors

     This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Fri Jul 19 2024
Journal Name
An International Journal Of Optimization And Control: Theories &amp; Applications (ijocta)
Design optimal neural network based on new LM training algorithm for solving 3D - PDEs
...Show More Authors

In this article, we design an optimal neural network based on new LM training algorithm. The traditional algorithm of LM required high memory, storage and computational overhead because of it required the updated of Hessian approximations in each iteration. The suggested design implemented to converts the original problem into a minimization problem using feed forward type to solve non-linear 3D - PDEs. Also, optimal design is obtained by computing the parameters of learning with highly precise. Examples are provided to portray the efficiency and applicability of this technique. Comparisons with other designs are also conducted to demonstrate the accuracy of the proposed design.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref