Preferred Language
Articles
/
ijl-23
Effects of Diode Laser 940 nm with and without 5 % Sodium Fluoride White Varnish with Tri-calcium Phosphate on Dentin Permeability (In vitro study)
...Show More Authors

It is found that hypersensitive teeth have a larger number and wider patent tubules than those of non-sensitive teeth. Objective: The aim of this study is to compare between the effects of diode laser at different power densities, with and without sodium fluoride on the sealing of exposed dentinal tubules and dentin permeability. Materials and methods: 118 teeth were used. Samples were divided into three major groups. The first consisted of 100 teeth used for permeability test. The second consisted of 16 teeth for measuring external surface temperature elevation while irradiation. The third, in turn, consisted of one pair of teeth observed under SEM for dentine surface morphology analysis. Results: For dentin permeability measurement, the results revealed a highly significant difference between the control group and 2, 3 W with varnish groups. For the external surface temperature elevation, the results revealed that temperature rise, for both laser alone and with varnish groups, was between (67-97.9 ∘C) at 1.6, 2 W. SEM analysis revealed that approximately optimum sealing of tubules occurred in 2W with the varnish group. Conclusions: The combined application of 940 nm diode laser at 2W with 809.7 W/cm² power densities, with sodium fluoride white varnish show a significant improvement in their effects on dentin permeability reduction as compared to each treatment alone.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Watershed Transform Based on Clustering Techniques to Extract Brain Tumors in MRI
...Show More Authors

In this work, watershed transform method was implemented to detect and extract tumors and abnormalities in MRI brain skull stripped images. An adaptive technique has been proposed to improve the performance of this method.Watershed transform algorithm based on clustering techniques: K-Means and FCM were implemented to reduce the oversegmentation problem. The K-Means and FCM clustered images were utilized as input images to the watershed algorithm as well as of the original image. The relative surface area of the extracted tumor region was calculated for each application. The results showed that watershed trnsform algorithm succeedeed to detect and extract the brain tumor regions very well according to the consult of a specialist doctor a

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Some Results on Fixed Points for Monotone Inward Mappings in Geodesic Spaces
...Show More Authors

In this article, the partially ordered relation is constructed in geodesic spaces by betweeness property, A monotone sequence is generated in the domain of monotone inward mapping,  a monotone inward contraction mapping is a  monotone Caristi inward mapping is proved, the general fixed points for such mapping is discussed and A mutlivalued version of these results is also introduced.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Aug 16 2021
Journal Name
TÜrkÇe SÖzlÜkte Tdk Yer Alan ArapÇa Kelİmeler Üzerİne Bİr Anlam Bİlİmİ İncelemesİ
A SEMANTICS REVIEW ON THE ARABIC WORDS IN THE TURKISH DICTIONARY (TDK)
...Show More Authors

Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
UV-Irradiation Effect on PC/DOP Composite in the C=C Region
...Show More Authors

In this research we study the effect of UV radiation on pure PC samples and doped samples with plasticizer (DOP) for different exposure times (6, 12, 18, 24h). The study have been made on the change in the IR spectra causes by the UV radiation on both kinds of samples, besides the morphology changes were also studied by the optical microscope. From the results we conclude that the increasing of exposure causes the elaboration of CO2 and C2 gases.

View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Some Results on Fuzzy ω-Covering Dimension Function in Fuzzy Topological Space
...Show More Authors

     The purpose of this paper is to study a new class of fuzzy covering dimension functions, called fuzzy

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Radioelectronics And Communications Systems
Optical CDMA Coded STBC Based on Chaotic Technique in FSO Communication Systems
...Show More Authors

Free-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref