Preferred Language
Articles
/
ijl-108
Detection and Quantification of Class I Caries with Laser Fluorescence Technique
...Show More Authors

The objective of the present study is to verify the actual carious lesion depth by laser
fluorescence technique using 650 nm CW diode laser in comparison with the histopathological
investigation. Five permanent molar teeth were extracted from adult individuals for different reasons
(tooth impaction, periodontal diseases, and pulp infections); their ages were ranging from 20-25 years
old. Different carious teeth with varying clinical stages of caries progression were examined. An
experimental laser fluorescence set-up was built to perform the work regarding in vitro detection and
quantification of occlusal dental caries and the determination of its actual clinical carious lesion depth by
650 nm CW diode laser (excitation wavelength (λexcit.) = 669 nm). Five teeth were sent to
histopathological examination to confirm the efficacy of laser fluorescence technique for the
determination of actual carious lesion depth. The results are leading to the detection of carious lesions for
different depths. The deepest carious lesions revealed high fluorescence intensity. Based on these
findings; it was concluded that 650 nm CW diode laser (λexcit. = 669 nm 40 mW) is a suitable and a
reliable tool for caries diagnosis and depth assessment. Histopathological findings for the estimation of
actual carious lesion depth revealed a good correlation with that of laser fluorescence technique.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Mon Dec 11 2006
Journal Name
Iraqi Journal Of Laser
In vivo N2 Laser Effect on Lymphocyte Transformation Capacity and Phagocytosis Activity in Mice
...Show More Authors

The objective of this in vivo study is to investigate the effects of 337.1 nm pulsed N2 laser on cellular immune response represented by lymphocyte transformation capacity and phagocytosis activity in laboratory animals. The samples include 60 adult male BALB/c mice, were divided into control group and experimental groups. The experimental groups were divided into two main groups according to the time period after N2 laser irradiation. Each group was divided into 9 subgroups which exposed to N2 laser radiation at different values of pulse repetition rates and exposure times. The results of immunological tests demonstrated that the exposure to 180 J/cm2 of N2 laser radiation induce adverse effect to cellular immune response. The results o

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Journal Of Optics
Advancements and challenges in pulsed laser-deposited hydrophobic CeO2 film for broadband antireflection applications
...Show More Authors

Due to the remarkable progress in photovoltaic technology, enhancing efficiency and minimized the costs have emerged as global challenges for the solar industry. A crucial aspect of this advancement involves the creation of solar cell antireflection coating, which play a significant role in minimizing sunlight reflection on the cell surface. In this study, we report on the optimization of the characteristics of CeO2 films prepared by pulsed laser deposition through the variation of laser energy density. The deposited CeO2 nanostructure films have been used as an effective antireflection coating (ARC) and light-trapping morphology to improve the efficiency of silicon crystalline solar cell. The film’s thickness increases as laser fluence i

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Plasmonic Nanoparticles Decorated Salty Paper Based on SERS Platform for Diagnostic low-Level Contamination: Lab on Paper
...Show More Authors

In this research, a low cost, portable, disposable, environment friendly and an easy to use lab-on-paper platform sensor was made. The sensor was constructed using a mixture of Rhodamine-6G and gold nanoparticles also Sodium chloride salt. Drop–casting method was utilized as a technique to make a platform which is a commercial office paper. A substrate was characterized using Field Emission Scanning Electron Microscope, Fourier transform infrared spectroscopy, UV-visible spectrophotometer and Raman Spectrometer. Rh-6G Raman signal was enhanced based on Surface Enhanced Raman Spectroscopy technique utilized gold nanoparticles. High Enhancement factor of Plasmonic commercial office paper reaches up to 0.9 x105 because of local surface pl

... Show More
View Publication Preview PDF
Publication Date
Tue May 10 2016
Journal Name
Iraqi New Medical Journal January
Which medical specialty do I choose? The answer of Iraqi graduated doctors working in Basra
...Show More Authors

OBJECTIVE: To determine the preferred specialties of graduated medical doctors working in Basra, and determine the factors behind their preferences. METHODS: The study was conducted in 38 primary health care centres and seven hospitals in Basra from January-June 2014. A cross-sectional study was adopted with the use of a self-administered questionnaire form. Two hundred ninety six graduated doctors were agreed to participate. Chisquare test and logistic regression were used to test the association between deciding a future speciality and influencing factors. RESULTS: The most preferred specialties were radiology and ultrasound, gynaecology and obstetrics, surgery, internal medicine, dermatology and paediatrics. Clinical specialties were sta

... Show More