Preferred Language
Articles
/
ijl-97
The Efficacy of Er:YAG Laser on Intrapulpal Temperature Rise of Class V Cavity Preparation
...Show More Authors

The objective of this study is to determine the efficacy of class V Er:YAG laser (2940 nm) cavity preparation and conventional bur cavity preparation regarding Intrapulpal temperature rise during cavity preparation in extracted human premolar teeth. Twenty non carious premolar teeth extracted for orthodontic purposes were used and class V cavity preparation was applied both buccal and lingual sides for each tooth .Samples were equally grouped into two major groups according to cavity depth (1mm and 2mm). Each major group was further subdivided into two subgroupsof ten teeth for each (twenty cavities for each subgroup). TwinlightEr:YAG laser (2940 nm) with 500mJ pulse energy, P.R.R of 10 Hz and 63.69 J/cm2 energy density was used. The analysis of the data collected revealed that there was highly significant difference between subgroups of each group, i.e., (Er:YAG laser and conventional bur cavity preparation). Also there was a highly significant difference between both group1 and group 2 subgroups (with 1mm and 2mm cavity depth). Best results were obtained from subgroup A which represents class V cavities prepared using Er:YAG laser with energy density of 63.69 J/cm2 .Er:YAG laser cavity preparation with energy density of 63.69 J/cm2 was less temperature rise than conventional bur cavity preparation taking into account the invitro temperature rise of class V cavity preparation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 21 2023
Journal Name
Mikrobiolohichnyi Zhurnal
Focus on Synergistic Bacteriocin-Nanoparticles Enhancing Antimicrobial Activity Assay
...Show More Authors

Antimicrobial resistance is one of the most significant threats to public health worldwide. As opposed to using traditional antibiotics, which are effective against diseases that are multidrug-resistant, it is vital to concentrate on the most innovative antibacterial compounds. These innate bacterial arsenals under the term «bacteriocins» refer to low-molecularweight, heat-stable, membrane-active, proteolytically degradable, and pore-forming cationic peptides. Due to their ability to attack bacteria, viruses, fungi, and biofilm, bacteriocins appear to be the most promising, currently accessible alternative for addressing the antimicrobial resistance (AMR) problem and minimizing the negative effects of antibiotics on the host’s m

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (9)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Difficulties of the opening text between changing and collecting reading in poem (city without rain): The Difficulties of the opening text between changing and collecting reading in poem (city without rain)
...Show More Authors

Abstract
This research deals with the technical of opening text during the critical
study about the poem of Al- ssiyab which is named ( city with out rain)
We chose this poem also to make connection with the western critical
theories.
Our study aims to explain the act of opening texts and critics and its
methods and directions in modern Arabic poetry.
It also aims to show the differences in the point of view between critics
and poetries.
The research depends on dimension vision of selective, and descriptive.

View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
QUALITY EVALUATION OF THE INTERNAL METALLIC COATING FOR SOME FOODS THAT AVAILABLE IN THE LOCAL MARKETS: QUALITY EVALUATION OF THE INTERNAL METALLIC COATING FOR SOME FOODS THAT AVAILABLE IN THE LOCAL MARKETS
...Show More Authors

The study aimed to estimate the content of lead and determine the quality of the internal coating of metal cans through electrical conductivity as well as to determine the accuracy of the information card for some types of canned food that available in local markets. The information card test showed that all of these samples contained the name of the food, trade mark, country origin, weight, and components, as was indicated by the company producing in all of them except for the C12 sample which was otherwise, and the batch number was mentioned in all samples except for the C3 and C17 which was not clear and not mentioned in the C21, and the validity period was observed (produce and fini

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE ROLE FEDERAL BOARD OF SUPREME AUDIT IN THE ENVIRONMENTAL MONITORING IN ACCORDANCE WITH INTOSAI STANDARDS: THE ROLE FEDERAL BOARD OF SUPREME AUDIT IN THE ENVIRONMENTAL MONITORING IN ACCORDANCE WITH INTOSAI STANDARDS
...Show More Authors

The worsening of environmental problems has led to them being addressed by many entities, the most important of which are the top regulators. Federal Board of supreme audit Office is one of the most important regulators in Iraq. The problem of the research was the fundamental question of the extent to which the Federal Financial Supervisory Office was committed to implementing and exercising environmental control over the audited ones. The refore, the research was based on the main objective of questioning the role of the Federal Financial Supervisory Office in the exercise of environmental control and the compliance of those under its control, by identifying the antosai standards for environmental control, particularly the stand

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 17 2021
Journal Name
Revista Iberoamericana De PsicologÍa Del Ejercicio Y El Deporte
THE EFFECT OF USING THE ELECTRONIC PARTICIPATORY LEARNING STRATEGY ACCORDING TO THE WEB PROGRAMS IN LEARNING SOME BASIC SKILLS OF BASKETBALL FOR FIRST-GRADE INTERMEDIATE SCHOOL STUDENTS ACCORDING TO THE CURRICULAR COURSE
...Show More Authors

The research aims to identify the impact of using the electronic participatory learning strategy according to internet programs in learning some basic basketball skills for middle first graders according to the curricular course, and the sample of research was selected in the deliberate way of students The first stage of intermediate school.As for the problem of research, the researchers said that there is a weakness in the levels of school students in terms of teaching basketball skills, which prompted the researchers to create appropriate solutions by using a participatory learning strategy.The researchers imposed statistically significant differences between pre and post-test tests, in favor of the post tests individually and in favor of

... Show More
View Publication