Preferred Language
Articles
/
ijl-108
Detection and Quantification of Class I Caries with Laser Fluorescence Technique
...Show More Authors

The objective of the present study is to verify the actual carious lesion depth by laser
fluorescence technique using 650 nm CW diode laser in comparison with the histopathological
investigation. Five permanent molar teeth were extracted from adult individuals for different reasons
(tooth impaction, periodontal diseases, and pulp infections); their ages were ranging from 20-25 years
old. Different carious teeth with varying clinical stages of caries progression were examined. An
experimental laser fluorescence set-up was built to perform the work regarding in vitro detection and
quantification of occlusal dental caries and the determination of its actual clinical carious lesion depth by
650 nm CW diode laser (excitation wavelength (λexcit.) = 669 nm). Five teeth were sent to
histopathological examination to confirm the efficacy of laser fluorescence technique for the
determination of actual carious lesion depth. The results are leading to the detection of carious lesions for
different depths. The deepest carious lesions revealed high fluorescence intensity. Based on these
findings; it was concluded that 650 nm CW diode laser (λexcit. = 669 nm 40 mW) is a suitable and a
reliable tool for caries diagnosis and depth assessment. Histopathological findings for the estimation of
actual carious lesion depth revealed a good correlation with that of laser fluorescence technique.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Problematic understanding of the question "What I overlooked something about you" when Sibweh
...Show More Authors

This research is an attempt to unveil the cover and unveil a matter that has become mysterious to those who came after Sibweh of the grammar scholars; It took place as a result of the work of the scribes.

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
Diffusion of Italian language through literary texts: Diffusione dell’italiano attraverso i testi letterari
...Show More Authors

  This work intends to illustrate the methods of using the authentic literary text in the process of spreading Italian, especially in Baghdad where there is a strong propensity to learn the Italian language. The concept of the language that arises from literature is an idea closely linked to the mentality of the Arab learner towards Italian culture: an idea also created by the first Arabisations of literary texts in the early years of the previous century. The research was carried out in Baghdad by two researchers, an Italianist from Baghdad and an Italian mother language linguist, with the aim of bringing together the two sectors in favor of the diffusion of the Italian language. The study also aims to clarify the models from Italian l

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
INVESTIGATION OF TWISTED TAPE TURBULATOR FOR FIRE TUBE BOILER Part I. Heat Transfer
...Show More Authors

The present work presents a new experimental study of the enhancement of turbulent
convection heat transfer inside tubes for combined thermal and hydrodynamic entry length of one
popular “turbulator” (twisted tape with width slightly less than internal tube diameter) inserted for
fire tube boilers. Cylindrical combustion chamber was used to burn (1.6 to 7kg/h) fuel oil #2 to
deliver hot gases with ranges of Reynolds number (10500 to 21700), and (11400 to 24150) for both
empty and inserted tube respectively.A uniform wall temperature technique was used by keeping
approximately constant water temperature difference (25ºC) between inlet and exit cooling water in
parallel flow shell and tube heat exchanger. The test

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
Imagination and Emotional Impact by Constructional Methods:Al-Almohdeen’s (Believers’) Poetry in AhlAl-Bayt, (peace be upon them) as a Model
...Show More Authors

The language that consists of only twenty-eight letters, but it is so broad that we are unable to understand it from all sides and this expansion is mainly caused by imagination, so Arab imagination, whose language goes in all directions And as it always responds to our ears, ancient critics divide imagination into holistic and partial But the language is not limited to these parts only. Do we wonder, where is the structural method of wishing, hope, questions and other methods of all this? In this paper, we try to show the importance of the method of writing in moving imagination in an interactive way, and what is related to human feelings in most, if not all, of its methods By studying the poetry of the believers in the Ahl al-Bayt, pea

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System
...Show More Authors

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 24 2015
Journal Name
Chinese Journal Of Biomedical Engineering
Single Channel Fetal ECG Detection Using LMS and RLS Adaptive Filters
...Show More Authors

ECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.

Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (14)
Crossref (8)
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 07 2021
Journal Name
Jurnal Teknologi
MODELS, DETECTION METHODS, AND CHALLENGES IN DC ARC FAULT: A REVIEW
...Show More Authors

The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref