Preferred Language
Articles
/
hxdH35IBVTCNdQwC78Lw
Evaluating dental implant stability using three devices Osstell<sup>®</sup>, Periotest<sup>®</sup>, and AnyCheck<sup>®</sup>: a clinical study
...Show More Authors

Introduction: Implant stability is usually measured with resonance frequency analysis (RFA) and damping capacity assessment (DCA). This study aimed to measure primary and secondary stabilities using 3 devices that are based on these methods, namely; RFA (Osstell®) and DCA (Periotest® and AnyCheck®) to assess the correlations of the measurements obtained by these devices and the correlations between implant stability and insertion torque. Material and Methods: This observational prospective study included 35 dental implants. The implant stability was measured using the 3 devices. Mann–Whitney U test and unpaired t-test assessed the relationship between implant stability and insertion torque, while the Spearman and Pearson correlations measured the correlation between readings collected via the 3 devices for the primary and secondary stabilities. Results: For the primary stability, there was a strong positive correlation between Osstell® and AnyCheck® and moderate negative correlations between Periotest® and both Osstell® and AnyCheck®. While for the secondary stability, strong correlations with similar patterns were observed among the 3 devices. The stability measurements showed significant relationships with the insertion torque. Conclusions: The 3 devices are reliable in measuring implant stability; also, high insertion torque can lead to improved implant stabilities (primary and secondary).

Scopus Crossref
View Publication
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Clinical and Sonographic Changes of Parotid Gland in Patients with Type I and Type II Diabetes Mellitus and Its Effect on Physical Properties of Saliva
...Show More Authors

Background: Sialosis described as a specific consequence of diabetes. In diabetic sialosis, the increased volume of the glands is due to the infiltration of adipose in the parenchyma. The B-scan ultrasonography is a generally accepted tool for determining parotid gland enlargement. Oral health is, to a greater extent, dependent on quality and quantity of saliva, both of which may be altered in diabetics. This study was established to detect the enlargement of parotid gland in diabetic patient and study the changes in physical properties of saliva and its relation with the salivary gland enlargement. Subjects, Materials and Methods: A cross-sectional study with highly specified criteria with ages ranged (20-65) years, male and female subject

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Sep 05 2014
Journal Name
International Journal Of Pharmacy And Pharmaceutical Sciences0975-1491
THE CORRELATION BETWEEN FRAMINGHAM RISK SCORE AND THE CLINICAL AND BIOCHEMICAL PARAMETERS THAT MEASURE FUNCTIONAL DISABILITY AND DISEASE ACTIVITY IN IRAQI PATIENTS WITH RHEUMATOID ARTHRITIS
...Show More Authors

Objective: Rheumatoid arthritis (RA) patients have increased morbidity and mortality from premature cardiovascular (CV) disease (CVD). Framingham risk score (FRS) is a simplified coronary prediction tool developed to enable clinicians to assess the risk of a cardiovascular event and to identify candidate patients for risk factors modifications worldwide. The predictive ability of the FRS varies between populations, ethnic groups, and socio-economic status. The aim of this study is to find if there is any correlation between the Framingham risk score and the inflammatory and biochemical parameters used to measure disease activity and functional ability in Iraqi patients with active RA.

View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Using Social Media sites by the Iraqi women and the Achieved The Use of Iraqi Women of Social Networking Sites and the Satisfactions Generated from Them.: A Survey Study of the City of Baghdad
...Show More Authors

The problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Civil And Environmental Engineering
Constructing a Corrected Stations Network Using Some Geomatic Techniques
...Show More Authors
Abstract<p>The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R<sup>2</sup>) is 0.077 m observed in Northing. While in</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Framework for Predicting Airfare Prices Using Machine Learning
...Show More Authors

Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Computers, Communications, Control And Systems Engineering
A Framework for Predicting Airfare Prices Using Machine Learning
...Show More Authors

Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Soft Computing And Computer Applications
Enhancing Image Classification Using a Convolutional Neural Network Model
...Show More Authors

In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref