Preferred Language
Articles
/
bsj-8244
Assessment of image quality of cervical spine complications using Three Magnetic Resonance Imaging Sequences
...Show More Authors

Examining and comparing the image quality of degenerative cervical spine diseases through the application of three MRI sequences; the Two-Dimension T2 Weighed Turbo Spin Echo (2D T2W TSE), the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE), and the T2 Turbo Field Echo (T2_TFE). Thirty-three patients who were diagnosed as having degenerative cervical spine diseases were involved in this study. Their age range was 40-60 years old. The images were produced via a 1.5 Tesla MRI device using (2D T2W TSE, 3D T2W TSE, and T2_TFE) sequences in the sagittal plane. The image quality was examined by objective and subjective assessments. The MRI image characteristics of the cervical spines (C4-C5, C5-C6, C6-C7) showed significant differences among the three sequences used P˂0.05 with the exception of the contrast P˃ 0.05. For the cervical spines (C4-C5), the minimum CNR was noticed with the T2_TFE sequence. For the cervical spines (C5-C6), the CNR and SNR were higher when they were assessed by the 2D T2W TSE sequence as compared to the other sequences. The same findings were observed with the cervical spines (C6-C7). The subjective assessment of the degenerative cervical spine diseases showed that the T2_TFE sequence is excellent in terms of viewing the central stenosis and foraminal stenosis. The best MRI diagnostic imaging can be obtained using the Turbo Field Echo (T2_TFE) and the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE) sequences to gain detailed diagnostic information regarding the central stenosis and foraminal stenosis of the cervical spines (C4-C5, C5-C6, C6-C7)

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Smart Routing Management Framework Exploiting Dynamic Data Resources of Cross-Layer Design and Machine Learning Approaches for Mobile Cognitive Radio Networks: A Survey
...Show More Authors

View Publication
Scopus (20)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Journal Of Molecular Structure
Mixed-ligand complexes of ampicillin derived Schiff base ligand and Nicotinamide: Synthesis, physico-chemical studies, DFT calculation, antibacterial study and molecular docking analysis
...Show More Authors

A novel series of mixed-ligand complexes of the type, [ML1(L2)3]Clx [M= Cr(III), Fe(III), Co(II),Ni(II), Cu(II), Cd(II) and Hg(II), n = 2, 3], was synthesized using Schiff base (HL1) as main ligand, nicotinamide (L2) as secondary ligand, and the corresponding metal ions in 1:3:1 molar ratio. The main ligand, HL1 was prepared by the interaction of ampicillin drug and 4-chlorobenzophenone. The synthesized mixed ligand complexes were characterized by elemental analysis, UV-Vis, FT-IR,1H-NMR,13C-NMR and TG/DTG studies. In the mixed-ligand complexes, the Schiff base ligand, HL1 showed coordination to the central metal ion in tridentate manner via azomethine nitrogen, β-lactam ring oxygen and deprotonated carboxylic oxygen atoms, whereas the sec

... Show More
View Publication
Scopus (38)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Mon Sep 15 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Investigating the antibacterial effect of German chamomile flower extract as a root canal irrigation solution against Enterococcus faecalis biofilm: An in vitro study
...Show More Authors

Background: Enterococcus faecalis (E. faecalis) is a prototypical resistant bacterium in root canal infections and a leading cause of endodontic treatment failure. German chamomile (Matricaria chamomilla) flower extract has been used as a traditional medicine to treat infections. The aim of this study was to investigate the antimicrobial efficacy of chamomile extract on the removal of E. faecalis root canal biofilm. Materials and Methods: Chamomile flower extract was prepared and subjected to detailed chemical analysis. For the in vitro biofilm model, human mandibular premolars (n=48) with 18-20mm working length were used. Root canal preparation was performed using the ProTaper® Next system. Each sample was split longitudinally and reassem

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Apr 04 2023
Journal Name
International Journal Of Professional Business Review
An Empirical Study to Measure the Impact of Information Technology Governance Under the Control Objectives for Information and Related Technologies on Financial Performance
...Show More Authors

Purpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration.   Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance.   Design/methodology/approach: To investigate the effect of information technology; we the valu

... Show More
View Publication
Scopus (26)
Crossref (6)
Scopus Crossref
Publication Date
Sat Aug 09 2025
Journal Name
Oxidation Communications
SYNTHESIS AND SPECTRAL CHARACTERISATION, MOLECULAR DOCKING, AND ANTIOXIDANT ACTIVITIES OF NOVEL METAL COMPLEXES AND THEIR NANOCOMPLEXES DERIVED FROM AN ISATIN-BASED SCHIFF BASE
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 25 2026
Journal Name
Al–bahith Al–a'alami
Qualitative Researches: Curriculum Integrity and Product Richness
...Show More Authors

These researches have shown the magnitude of the influence that culture exerts on all human extensions and spaces. Rather, the conviction of many thinkers, researchers and specialists in the comprehensiveness of this influence is such that it is used as a starting point and perspective to explain the various aspects, manifestations, problems and practices. According to these perceptions, a man carries a cultural mind that is slowly formed throughout the young years of a man’s life and is completed upon reaching the age of maturity. Therefore, it has become evident in the behavioral, social and human sciences to acknowledge the multiplicity of human thought patterns as a natural result of the different cultures of peoples and societies.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Comparison between Ghassan Kanafani's Novel " Ma tabaqa lakom" and William Faulkner's "The Sound and the Fury" from the Perspective of the American School (the methodology of the novelistic theme and style): مقایسة دو رمان "ماتبقّي لكم"کنفانی و " خشم و هياهو"ی فاکنر بر اساس مكتب آمريكا (بررسی روش شناختی محتوایی و سبکی )
...Show More Authors

     Being the meeting points of the world different languages and out of a scholarly perspective, comparative literature represents a cultural leap as well as an artistic and intellectual development or a global literary movement of both prose and poetry. Such homogenous literary structure requires a systematic and coherent study of the literary output of the people different cultures and civilizations. It also represents the theoretical approach of the present study that debates a systematic comparison between Ghassan Kanafani’s All That's Left to You and William Faulkner’s. The Sound and the Fury.  Within the perspective of the descriptive analysis approach, the present paper discusses th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
ADVERTISING CAMPAIGNS IN TV CHANNELS : (A Research Drawn from A Master Thesis)
...Show More Authors

Television culture has become the most dangerous of our time. It manipulates with minds and hearts together; and forms consciousness. It transforms societies into actual forces rejecting certain principles by guiding the media landscape through visible connotations acceptable to the public; or provokes the citizen against elements that put a burden on the viewer or the public in order to create a positive reaction to the subject of combating terrorism by combining these ads in line with what the public wants of security and tranquility and a decent living after suffering from terrorism in the past years.

Therefore, this research deals with television advertisements as one of the most important fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Study of the hadeeth saying "peace be upon him" ("Allaah is enough for me to solve your harams, and sing me for your goodness")
...Show More Authors

I dealt with this study of one of the hadiths of the Prophet and judged him after studying his deed, especially one of his narrations for the similarity in his name and the name of his father (Abdul Rahman bin Ishaq) Is he a civil "Sadok" or Wasti "weak" and they are in one layer which is called in the science of Hadith (agreed And after a review of Kutkut translations and wound and amendment and other evidence and evidence that it was "weak" and not as he went to him and asserted by the updated Muhammad Nasser al-Din al-Albani may God have mercy on him that in Sindh is a civil rule for the hadeeth "Hassan" and not as said The hadeeth is “weak” because he showed that it is the weak Wasti.
I ask God to be successful in this work an

... Show More
View Publication Preview PDF