Preferred Language
Articles
/
ijl-148
Clinical Observation and Performance of High Power Diode Laser in the Treatment of Oral Lesions
...Show More Authors

In this work, oral lesions belong to 17 patients, 7 males and 10 females. Their ages range between 15 and 45 years. Follow up was conducted after one day, 7 days, 14 days, one month, and finally 3 months postoperatively. The study lasted for 1.5 year. Surgical diode laser with wavelength of 810 ± 20 nm, with two power levels of 10 and 15 W were used in contact and in non-contact mode via optical fiber. The postoperative outcome revealed; greater haemostatic capability, dry, sealed wound and noticeable lack in pain sensation

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
The role of artificial intelligence in revolutionizing the clothing and textile industry
...Show More Authors

 The integration of AI technologies is revolutionizing various aspects of the apparel and textile industry, from design and manufacturing to customer experience and sustainability. Through the use of artificial intelligence algorithms, workers in the apparel and textile industry can take advantage of a wealth of opportunities for innovation, efficiency and creativity.
The research aims to display the enormous potential of artificial intelligence in the clothing and textile industry through published articles related to the title of the research using the Google Scholar search engine. The research contributes to the development of the cultural thought of researchers, designers, merchants and the consumer with the importance of integ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Development and democracy in the Republic of Korea study in dialectic relationship
...Show More Authors

After its 35-year occupation of Japan and the US occupation, Korea has set its sights on a long-term goal of building its country and establishing its foundations, unobtrusive and unchecked by the problems and wars that have stood in the way of its goal, surpassing all odds and achieving the best results. The most powerful Asian and global economies, which gained the respect of the world and its appreciation of the experience has become referred to as boys

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
Effectiveness of the self-questioning strategy in the achievement of the third stage Institutes of teacher preparation and decision - making in Chemistry
...Show More Authors

This research aims to find out "the effectiveness of the self-questioning strategy in the achievement of students Phase III institutes of teacher preparation and decision-making in chemistry." The researcher follows approach quasi-experimental with a post-test, and the sample consisted of (27) from " Teachers Training Institute-AL-Byaa "in Directorate of Education Baghdad Karkh / 2 students divided into two unequal groups: experimental its number (14) students studied using reciprocal teaching strategy and control its number (13) students have studied in the usual way.The two groups were equivalent extraneous variables.

The researcher was prepare achievement test consist of 40 items was the adoption of a measure of decision-makin

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The impact of managing organizational diversity in achieving success Exploratory study in the Ministry of Industry and Minerals
...Show More Authors

The aim of the research is to demonstrate the impact of organizational diversity management on achieving success, The problem of research is to create an appropriate work environment that stimulates everyone regardless of each dimension of diversity, So as to reach the best levels of success, The importance of research is to identify how the organization in question can manage organizational diversity effectively and contribute to its success, The research started from two main hypotheses which were derived from sub-hypotheses to identify the correlation and influence between the search variables by analyzing the answers of the research sample which included (81)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 23 2010
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sc I
Synthesis, Spectroscopic and Dyeing Performance Studies of Some New Heterocyclic Azo Dyes and Their Complexes with Selected Metal Ions
...Show More Authors

Coupling reaction of m-and p- amino acetop henone and p-amino benzoic acid with (LHistidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass sp ectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M (L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the com

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
2018 Detroit, Michigan July 29 - August 1, 2018
Design and validation of an electronic data logging systems (CAN Bus) for monitoring machinery performance and management- Planting application
...Show More Authors

View Publication
Scopus (7)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Financial education, political instability and firm performance: Evidence from Malaysian SMEs
...Show More Authors

This study assesses the short-term and long-term interactions between firm performance, financial education and political instability in the case of Malaysia Small to Medium Enterprises (SMEs). The simultaneous insertion of financial education and political instability within the study is done intentionally to inspect the effect of these two elements in one equation for the Malaysian economy. Using the bound testing methodology for cointegration and error correction models, advanced within an autoregressive distributed lag (ARDL) framework, we examine whether a long-run equilibrium connection survives between firm performance and the above mentioned independent variables. Using this method, we uncover evidence of a positive long-term link b

... Show More
Scopus (2)
Scopus
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
A Prototype and Roadmap for Transition to IPv6 with Performance Evaluation
...Show More Authors

The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref