Preferred Language
Articles
/
ijl-295
Thermal Effects of 940 nm Diode Laser on Dental Socket Blood after Teeth Extraction for Diabetic Patients
...Show More Authors

Abstract: Background: High percentage of diabetes patients complain from post extraction hemorrhage. Many types of hemostatic materials are used to stop bleeding after teeth extraction: diode lasers are good hemostatic agents owing to their highly absorption by hemoglobin therefore they are used in soft tissue procedures with relatively no effects on dental hard tissues due to their poorly absorption by water and hydroxyapatite. Objectives: The aim of this study is to evaluate the efficiency of diode laser to assist the clot formation after tooth extraction for type II diabetes patients with minimum temperature elevation to prevent periodontal destruction. Materials and methods: From 12 type II diabetes patients (7 males and 5 females with age mean of 49.5) blood samples are obtained for the pilot study of clot formation and for studying the thermal effects of laser on blood, then the selected dose is applied on the extracted dental sockets of diabetes patients. Results: A significant difference is observed in the temperature of blood before and after laser application; the mean temperature elevation is less thanthe critical temperature of periodontal destruction. Moreover, firm blood clot is formed over the extraction site; the follow up of patients shows good healing with relatively no complications. Conclusions: Diode laser assists in the coagulation of the dental socket after tooth extraction without thermal damage to the periodontium.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
N3, N749 dyes effect on the TiO2 for optoelectronic applications
...Show More Authors

The present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
A Review on Induced Electro-Fenton Process for Wastewater Treatment
...Show More Authors
Abstract<p>Induced EF is among the most important of advanced oxidation processes (AOPs) It was employed to treat different kinds of wastewater. In the present review, the types and mechanism of induced EF were outlined. Parameters affecting this process have been mentioned with details. These are current density, pH, H<sub>2</sub>O<sub>2</sub> concentration, and time. The application of induced electro Fenton in various sectors of industries like textile, petroleum refineries, and pharmaceutical were outlined. The outcomes of this review demonstrate the vital role of induced EF in treatment of wastewater at high efficiency and low cost in contrast with conventional technique</p> ... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (329)
Crossref (295)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (9)
Scopus Crossref
Publication Date
Tue Oct 03 2023
Journal Name
Biomedical And Pharmacology Journal
The Significance of Remdesivir and Favipiravir Therapies to Survival of COVID-19 Patients
...Show More Authors

The coronavirus disease 2019 (COVID-19) pandemic and the infection escalation around the globe encourage the implementation of the global protocol for standard care patients aiming to cease the infection spread. Evaluating the potency of these therapy courses has drawn particular attention in health practice. This observational study aimed to assess the efficacy of Remdesivir and Favipiravir drugs compared to the standard care patients in COVID-19 confirmed patients. One hundred twenty-seven patients showed the disease at different stages, and one hundred and fifty patients received only standard care as a control group were included in this study. Patients under the Remdesivir therapy protocol were (62.20%); meanwhile, there (30.71

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jun 11 2019
Journal Name
Al-kindy College Medical Journal
Conservative Treatment of Tuberculosis of the Spine in Patients with no Neurological Deficits
...Show More Authors

Background: Patients who have both neurological impairment and kyphotic deformity can be treated medically, and this treatment can be achieved with anti-tuberculous drugs alone.

Objective: To evaluate conservative medical management of patients with tuberculosis of the spine (Pott disease). The prognostic significance of various clinical, radiological, and long-term follow-up findings in these patients was also evaluated.

Methods: Between January 2009 and January 2018 data were collected prospectively at The Neurosciences Hospital/ Baghdad/ Iraq in 44 patients with Pott disease in the thoracic and lumbar spine. These patients had no major neurological deficits or

... Show More
View Publication Preview PDF
Crossref