Preferred Language
Articles
/
ijl-108
Detection and Quantification of Class I Caries with Laser Fluorescence Technique
...Show More Authors

The objective of the present study is to verify the actual carious lesion depth by laser
fluorescence technique using 650 nm CW diode laser in comparison with the histopathological
investigation. Five permanent molar teeth were extracted from adult individuals for different reasons
(tooth impaction, periodontal diseases, and pulp infections); their ages were ranging from 20-25 years
old. Different carious teeth with varying clinical stages of caries progression were examined. An
experimental laser fluorescence set-up was built to perform the work regarding in vitro detection and
quantification of occlusal dental caries and the determination of its actual clinical carious lesion depth by
650 nm CW diode laser (excitation wavelength (λexcit.) = 669 nm). Five teeth were sent to
histopathological examination to confirm the efficacy of laser fluorescence technique for the
determination of actual carious lesion depth. The results are leading to the detection of carious lesions for
different depths. The deepest carious lesions revealed high fluorescence intensity. Based on these
findings; it was concluded that 650 nm CW diode laser (λexcit. = 669 nm 40 mW) is a suitable and a
reliable tool for caries diagnosis and depth assessment. Histopathological findings for the estimation of
actual carious lesion depth revealed a good correlation with that of laser fluorescence technique.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Steganography Technique using Genetic Algorithm
...Show More Authors

Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Eye Detection using Helmholtz Principle
...Show More Authors

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Image Segmentation for Skin Detection
...Show More Authors

Human skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Domestic Technique in Batik Art
...Show More Authors

Domestic Technique in Batik Art

View Publication Preview PDF
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System
...Show More Authors

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
مجلة كليه التربيه الاساسيه
تقويم محتوى كتاب مادة الكيمياء للصف الأول المتوسط على وفق معايير محددة
...Show More Authors

يعد التقويم مبدأ مهماً في العملية التعليمية لأنه يساعد في التعرف على الاختلاف بين ما ينبغي تحقيقة وما تحقق فعلاً وما يترتب على ذلك من توصيات لدعم ما تحقق فعلاً (الأهداف التربوية) وتصحيح مسار العملية التعليمية من خلال المقترحات لتلافي السلبيات التي عثرت تحقيق الأهداف الأخرى وبما أن المحتوى هو أحد عناصر المنهج المهمة وهو وسيلة المعلم في أيصال المعلومات وبقائها في ذهن المتعلم أطول فترة ممكنه من خلال تبسيط المفا

... Show More
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Parental Oral Violence against Their Teen- ager Children and its Relation with Some Variables: Parental Oral Violence against Their Teen- ager Children and its Relation with Some Variables
...Show More Authors

Abstract
The Verbal Violence that is directed towards sons is considered one of
the dehavioural problems that have negative reflections on the personality
of the individual . the increase in the frequency and intensity of that
behavior in the daily life may lead to psychological and behavioural
disturbances, and such behaviourhas to be stooped in an early time before it

leave negative affects on the personality of the teenager which will not be
cured or removed easily .
The family that is represented by the parents has a prominent effect In the
shaping of the teenager's personality , hence forth the normal teenage is
a reflection of a stable family life , relatively empty of disturbances and
unbalanc

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Hemorrhoidectomy Using (10600 nm) CO2 Laser
...Show More Authors

Hemorrhoids are one of the most common surgical conditions. The hemorrhoid may cause symptoms that are: bleeding, pain, prolapse, itching, spoilage of feces, and psychologic discomfort. There are many methods for treatment of hemorrhoid like, medical therapy, rubber band ligation, electerocoagulation, stapled hemorrhoidpexy, photocoagulation, sclerothereapy, doppler guided artery ligation, Cryosurgery, and surgery. All methods for treatment of hemorrhoids have advantages, disadvantages, and limitations. Conventional haemorrhoidectomy was the traditional operation for the treatment of hemorrhoids. But recently other modalities of treatment had been used as an alternative operations including CO2 laser haemorrhoidectomy. This work aims to

... Show More
View Publication Preview PDF