Preferred Language
Articles
/
bBjZxJcBVTCNdQwCfJz8
Management of Traumatized Permanent Maxillary Immature Incisor with Oblique Subgingival Crownroot Fracture
...Show More Authors

Background: Trauma to the anterior teeth is a common injury in young children. Themaxillary incisors being the most affected. Although root fractures are rare, theydo occur and were previously and often considered hopeless and were extracted.The time between the injury and the initiation of treatment, level of the fractureline, and stage of root development are some criteria to be considered whenchoosing a treatment approach for a complicated tooth fracture. This case reportdescribes the management of a traumatized immature maxillary central incisorwith Elise class IV fracture with vertical oblique subgingival fracture of the root.Materials and method: Apexification was carried out using biodentine followed byremoval of the fractured segment. A fiber post was cemented in the root canalwith resin cement. The coronal portion of the tooth was restored using anteriorlight cured composite material. The tooth was examined and evaluated after 1week and after 2 months by clinical examination and radiographical evaluation ofroot development.Results: The follow up evaluation revealed clinical and radiographical success.Radiographic view showed continued development in the apex of the root andshowed normal periodontal ligament space and dense lamina dura.Conclusion: Extraction should not be the first choice of treatment for extensivelydamaged young permanent teeth in the anterior region; instead, alternativetreatment modalities must be considered. The traumatized immature tooth wassaved and restored.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Faculty Of Medicine Baghdad
Outcome of buccal mucosal patch graft in the Management of recurrent hypospadias urethrocutaneous fistula
...Show More Authors

Background: urethrocutaneous fistula after hypospadias surgery repair is the most common complication and remains a frustrating problem for surgeon and the patient. The problem is exacerbated because the urethrocutaneous fistula may recur which adds more demands surgery. Objectives: The purpose of this study is to evaluate of the use of oral mucosal graft for management of recurrent urethrocutaneous fistula after hypospadias repair. Patients and Methods: twelfth patients with age ranging from 4 year to 15 years were presented with history of recurrent fistula. Most of fistula were located in proximal penile and penoscrotal region (58.3%) . those patients were repaired by using oral mucosal graft with mean postoperative follow up period up t

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
An Electronic and Web-Based Authentication, Identification, and Logging Management System
...Show More Authors

The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Current Pharmaceutical Design
Dry Eye Disease: Present Challenges in the Management and Future Trends
...Show More Authors

View Publication
Scopus (41)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Energy management and storage systems on electric vehicles: A comprehensive review
...Show More Authors

View Publication
Scopus (52)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Building a Management System to Control the Construction Claims in Iraq
...Show More Authors

The paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Ieee Transactions On Very Large Scale Integration (vlsi) Systems
Low-Power, Highly Reliable Dynamic Thermal Management by Exploiting Approximate Computing
...Show More Authors

With the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref