Preferred Language
Articles
/
iRb2XIcBVTCNdQwC9kdb
Synthesis and Preliminary Evaluation of a Polyolefin-based Core for Carrier-based Root Canal Obturation
...Show More Authors

Introduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were determined using a universal testing machine. The radiographic appearance was established using digital periapical radiographs. Results: The composite core carrier exhibited a melting point of 111°C to 112°C, which would facilitate removal by heat application. The elastic modulus and the tensile strength were found to be lower than those of Thermafil carriers (Dentsply Tulsa Dental, Tulsa, OK). The preliminary radiographic evaluation showed that the novel composite core carrier is sufficiently radiopaque and can be distinguished from gutta-percha. Conclusions: The PE-HA-SrO composites were successfully melt processed into composite core carriers for delivering gutta-percha into the root canal space.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
An open cloud-based platform for the creation and delivery of smart applications and services
...Show More Authors
Abstract<p>With the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo</p> ... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Acta Logistica
A business continuity-based framework for risk management in smart supply chains: a fuzzy multi-criteria decision-making approach
...Show More Authors

The aim of this study is to develop a novel framework for managing risks in smart supply chains by enhancing business continuity and resilience against potential disruptions. This research addresses the growing uncertainty in supply chain environments, driven by both natural phenomena-such as pandemics and earthquakes—and human-induced events, including wars, political upheavals, and societal transformations. Recognizing that traditional risk management approaches are insufficient in such dynamic contexts, the study proposes an adaptive framework that integrates proactive and remedial measures for effective risk mitigation. A fuzzy risk matrix is employed to assess and analyze uncertainties, facilitating the identification of disr

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Synthesis, Characterization and Evaluation of Overbased Magnesium Fatty Acids Detergent for Medium Lubricating Oil
...Show More Authors

A series of overbased magnesium fatty acids such as caprylate, caprate, laurate, myristate, palmitate, stearate and oleate) were synthesized by the reaction of the fatty acids with active – 60 magnesium oxide and carbon dioxide (CO2) gas at 60 oC in the presence of ammonia solution as catalyst, toluene / ethanol solvent mixture (9:1vol/vol) was added.
The prepared detergent additives were characterized by FTIR, 1HNMR and evaluated by blending each additive in various concentrations with medium lubricant oil fraction (60 stock) supplied by Iraqi Midland Refineries Company. The total base number (TBN, mg of KOH/g) was determined, and the results of TBN were treated by using two-way analysis of variance (ANOVA) test. It was found that

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 09 2021
Journal Name
Revista Latinoamericana De Hipertension
Synthesis, chemical hydrolysis and biological evaluation of doxorubicin carbamate derivatives for targeting cancer cell
...Show More Authors

Scopus (1)
Scopus
Publication Date
Fri Nov 15 2024
Journal Name
Scientific Reports
Ag@WO3 core–shell nanocomposite for wide range photo detection
...Show More Authors

This study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The ph

... Show More
View Publication
Scopus (4)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref