Preferred Language
Articles
/
ijl-87
Excision of Soft Tissue Oral Lesions by 810 nm Diode Laser
...Show More Authors

The present study was conducted on 20 patients suffering from different types of lesion like
pyogenic granuloma, peripheral giant cell granuloma, mucoceles, pregnancy tumour, Fordyce's granules
and irritating fibroma.The cases were selected from outpatient clinic of the Al Kydhemya Teaching
Hospital. Patients were treated by diode laser (810±20 nm) at the affected areas of the oral cavity with
continuous contact focused mode until excision of the lesion with coagulation of the oozing area after
excision. Patients were followed up after 2 days, 7 days and 2 weeks to assess healing process and any
post operative complication. Some of undiagnosed lesion sent for histopathological examination. No
serious complications were recorded; one suffered from slight oedema and one case with simple
bleeding. After 2 months follow up, recurrence occurred in one case. Diode laser provides a marked
clinical improvement without the need for surgical intervention.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2000
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Phenol from Water by Adsorption
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Removal of Water Turbidity by Different Coagulants
...Show More Authors

During the last decade, there has been a concern about the relation between aluminum residuals in treated water and Alzheimer disease, and more interest has been considered on the development of natural coagulants. The present study aimed to investigate the efficiency of alum as a primary coagulant in conjunction with mallow, Arabic gum and okra as coagulant aids for the treatment of water samples containing synthetic turbidity of kaolin. Jar test experiments were carried out for initial raw water turbidities 100, 200 and 500 (NTU). The optimum doses of alum, mallow, Arabic gum and okra were 20, 2, 1 and 1 mg/L for100 NTU turbidity level, 35, 4, 2 and 3 mg/L , for 200NTU turbidity level and 50, 8, 10 and 8 mg/L for 500 NTU turbidity leve

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Microporous And Mesoporous Materials
Synthesis of hierarchically porous ZSM-5 zeolite by self-assembly induced by aging in the absence of seeding-assistance
...Show More Authors

View Publication
Scopus (53)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Production of Formaldehyde by Catalytic Conversion of Methanol
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Feb 01 2013
Journal Name
Proceedings Of The Institution Of Civil Engineers - Ground Improvement
Treatment of collapse of gypseous soils by grouting
...Show More Authors

Gypseous soil is a collapsible soil, which causes large deformations in buildings that are constructed on it. Various methods have been used to minimise this effect, such as replacing the gypseous soil or using soil stabilisation (grouting or soil improvement). This study was carried out on four types of gypseous soils that have different properties and various gypsum contents. The testing was carried out on remoulded samples to evaluate the compressibility of gypseous soil under different conditions. The samples were grouted with acrylate liquid. The relationships between the injection pressure and the radius of flow, between time of injection and radius of flow, and between time and quantity of acrylate liquid are investigated on

... Show More
View Publication
Crossref (18)
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Stimulation of Macrophage Cells Against Cutaneous Leishmaniasis Using Silver Nanoparticles
...Show More Authors

Cutaneous leishmaniasis is a disease caused by Leishmania tropica parasite. Current treatments for this parasite are undesirable because of their toxicity, resistance, and high cost. Macrophages are key players against pathogens. Nitric oxide (NO), a molecule produce by immune cells, controls intracellular killing of pathogens during infection. Silver nanoparticles (Ag NPs) demonstrated broad-spectrum activity against various types of infectious diseases. It has the ability to stimulate oxygen species production.  This study aims to analyze the macrophages activation through NO production and estimate the cytotoxicity based on the lactate dehydrogenase (LDH) release upon exposure to L. tropica and

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Oct 11 2021
Journal Name
Nano Hybrids And Composites
Far Infrared Laser Detector Based on Multi-Walled Carbon Nanotubes and Blend of (Polyaniline - Polymethyl Methacrylate) Polymers with Methyl Blue Dye for Photoconductive Applications
...Show More Authors

Infrared photoconductive detectors working in the far-infrared region and room temperature were fabricated. The detectors were fabricated using three types of carbon nanotubes (CNTs); MWCNTs, COOH-MWCNTs, and short-MWCNTs. The carbon nontubes suspension is deposited by dip coating and drop–casting techniques to prepare thin films of CNTs. These films were deposited on porous silicon (PSi) substrates of n-type Si. The I-V characteristics and the figures of merit of the fabricated detectors were measured at a forward bias voltage of 3 and 5 volts as well as at dark and under illumination by IR radiation from a CO2 laser of 10.6 μm wavelengths and power of 2.2 W. The responsivity and figures of merit of the photoconductive detector

... Show More
View Publication
Crossref (1)
Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref