Preferred Language
Articles
/
ijl-108
Detection and Quantification of Class I Caries with Laser Fluorescence Technique
...Show More Authors

The objective of the present study is to verify the actual carious lesion depth by laser
fluorescence technique using 650 nm CW diode laser in comparison with the histopathological
investigation. Five permanent molar teeth were extracted from adult individuals for different reasons
(tooth impaction, periodontal diseases, and pulp infections); their ages were ranging from 20-25 years
old. Different carious teeth with varying clinical stages of caries progression were examined. An
experimental laser fluorescence set-up was built to perform the work regarding in vitro detection and
quantification of occlusal dental caries and the determination of its actual clinical carious lesion depth by
650 nm CW diode laser (excitation wavelength (λexcit.) = 669 nm). Five teeth were sent to
histopathological examination to confirm the efficacy of laser fluorescence technique for the
determination of actual carious lesion depth. The results are leading to the detection of carious lesions for
different depths. The deepest carious lesions revealed high fluorescence intensity. Based on these
findings; it was concluded that 650 nm CW diode laser (λexcit. = 669 nm 40 mW) is a suitable and a
reliable tool for caries diagnosis and depth assessment. Histopathological findings for the estimation of
actual carious lesion depth revealed a good correlation with that of laser fluorescence technique.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Dec 14 2014
Journal Name
Al-khwarizmi Engineering Journal
Determination of Optimum Welding Parameters for FSW AA2024-T351
...Show More Authors

 

Abstract

Friction stir welding is a relatively new joining process, which involves the joining of metals without fusion or filler materials. In this study, the effect of welding parameters on the mechanical properties of aluminum alloys AA2024-T351 joints produced by FSW was investigated.

Different ranges of welding parameters, as input factors, such as welding speed (6 - 34 mm/min) and rotational speed (725 - 1235 rpm) were used to obtain their influences on the main responses, in terms of elongation, tensile strength, and maximum bending force. Experimental measurements of main responses were taken and analyzed using DESIGN EXPERT 8 experimental design software which was used to develop t

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Urinary Tract Lithotripsy Using Holmium: YAG (2100nm) Laser
...Show More Authors

Background: Laser urinary stone lithotripsy is an established endourological modality. Ho:YAG(2100nm) laser have broadened  the indications for ureteroscopic stone managements  to include larger stone sizes throughout the whole urinary tract.

Purpose: To evaluate the effectiveness and safety of Holmium: YAG(2100nm) laser lithotripsy with a semirigid uretero scope for urinary stone calculi in a prospective cohort of 17 patients.

Patients and Methods: Holmium: YAG(2100nm) laser lithotripsy was performed with a semirigid ureteroscope in 17 patients from September 2016 to December  2016. Calculi were located in the lower ureter in 9 patients (52.9%), the midure

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 19 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Nickel Oxide Thin Films Grooved by Laser Processing
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
In Growing Toenail Treatment using Carbon Dioxide Laser
...Show More Authors

An ingrowing toenail is a common problem affecting mainly adolescents and young adults, with a male predominance of 3:1. The disorder generally occurs in big toes. It is painful and often chronic and it affects work and social activities. Most patients initially complain of pain and later discharge, infection and difficulty in walking occur. The Objectives: The purpose of the study was to evaluate the efficacy and safety of (10600nm) CO2 laser in the treatment of ingrowing toe nail. Patients, Materials & Methods: This study was done in laser medicine research clinics from July 2013 to the end of December 2013; 10 patients including 7(70%) males and 3 (30%) females with age ranging from 18 years to 70 years with mean age of 44 years o

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
Nanocrystalline -Silicon Carbide Films Prepared by TEACO2 Laser
...Show More Authors

Thin films of microcrystalline and nanocrystalline -silicon carbide and silicon, where deposited on glass substrate with substrate temperature ranging from 350-400C, with deposition rate 0.5nm per pulse, by laser induced chemical vapor deposition. The deposition induced by TEACO2 laser. The reactant gases (SiH4 and C2H4) photo decompose throughout collision associated multiple photon dissociate. Such inhomogeneous film structure containing crystalline silicon, silicon carbide and amorphous silicon carbide matrix, give rise to a new type of material nanocrystalline silicon carbide in which the optical transmittance is governed by amorphous SiC phase while nanocrystalline grain are responsible for the conduction processes. This new m

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref