Preferred Language
Articles
/
bBjOzpcBVTCNdQwCj537
Femal pattern alopecia and lipoproteins
...Show More Authors

KE Sharquie, AA Noaimi, HA Salman, NA Hindy, Iraqi Postgraduate Medical Journal, 2009 - Cited by 1

View Publication
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Occurrence and pattern of antibiotic resistance among dental plaque bacteria from gingivitis patients and their clinical correlation
...Show More Authors

Background: A diverse group of bacteria live in biofilms in the oral cavity. On dental surfaces biofilms form plaque that is potentially involved in caries and periodontal diseases. Periodic studying of plaque microflora and their antimicrobial sensitivity patterns strongly affects the clinical practice in plaque-induced oral diseases. Materials and methods: Dental plaque samples were collected from 22 patients having ages ranged between 33 and 49 years with gingivitis that met the study criteria. Plaque, gingival and gingival bleeding indices (PI, GI, GBI) were measured for each patient. Laboratory procedures included microbiological examination of plaque samples followed by antibiotic sensitivity testing using disc diffusion method were

... Show More
View Publication
Crossref
Publication Date
Fri Nov 30 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Damage pattern scope prediction for well point dewatering on building foundations
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering
Simulation and Experimental Walking Pattern Generation for Two Types of Degrees of Freedom Bipedal Locomotion Robot
...Show More Authors

Humanoids or bipedal robots are other kinds of robots that have legs. The balance of humanoids is the general problem in these types when the other in the support phase and the leg in the swing phase. In this work, the walking pattern generation is studied by MATLAB for two types of degrees of freedom, 10 and 17 degrees of freedom. Besides, the KHR-2HV simulation model is used to simulate the experimental results by Webots. Similarly, Arduino and LOBOT LSC microcontrollers are used to program the bipedal robot. After the several methods for programming the bipedal robot by Arduino microcontroller, LOBOT LSC-32 driver model is the better than PCA 96685 Driver-16 channel servo driver for programming the bipedal walking rob

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Determination of Diabetes type 2 Clients’ Self-Management Skills toward Dietary Pattern
...Show More Authors

Objective: study aims to identify the diabetes type2 clients self management skills toward dietary pattern
, and find out the relationship between variables which are (Age, gender, educational level, duration of DM
diagnosis, and monthly income) with diabetes type 2 clients self management skills toward dietary pattern
Methodology: descriptive study was carried out through the present investigation from January 2nd
2011to September 2nd 2011 in order to achieve the objectives of the present study. A non probability
(purposive) sample, (200) cases which consists of clients who were attending Al-Nasiriyha diabetic center.
Including (118) males and (82) females. The data were collected by utilization of the study instrument

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Iop
Water cut comparison for a really similar gridding system (line drive pattern)
...Show More Authors

Scopus
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Prescribing pattern of antibiotics in AL-Elwia Pediatric Teaching Hospital, Baghdad, 2016.
...Show More Authors

Background: Antibiotics are among the most commonly used medicine, in both community and hospital setting, all over the world especially in countries where no strict guideline to regulate their use. In Iraq, only a few studies conducted to describe the antibiotic prescription pattern in general hospitalsand even less in pediatric hospital.

Objective: To describe the patterns for antibiotics used in Elwia pediatric teaching hospital in Baghdad, Iraq

Type of the study: Descriptive cross sectional study.

.Methodology: The study was conducted at AL-Elwia Pediatric Teaching Hospitalduring the year 2016. A random sample from all the prescriptions sheets

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Influence of multiple dynamic factors on the performance of myoelectric pattern recognition
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Expert Systems With Applications
A long short-term recurrent spatial-temporal fusion for myoelectric pattern recognition
...Show More Authors

View Publication
Scopus (21)
Crossref (22)
Scopus Clarivate Crossref