Preferred Language
Articles
/
jbcd-1433
Radiological Assessment of Mandibular Retromolar Canal (MRMC) Using CBCT-Radiographs in a Sample of Iraqi Patients
...Show More Authors

Background: Because of its clinical and surgical importance and lack of precise information about this rare and important anatomical landmark, this study was designed to detect the presence, configurations and length of Mandibular Retromolar Canal (MRMC) with aid of CBCT visualization. Materials and methods: In this retrospective study the data was obtained from Specialist Health Center in AL-Sadder city in Baghdad for (100) patients with 200 inferior dental canal, all of them referred to CBCT scan (Kodak 9500, French origin). The scanning was done with tube voltage 90 kVp, tube current with 10mA and exposure time was 10 s., the field of view was measured with 5cm x 3.7cmwith 0.03mm voxel size Results: In the present study the prevalence of MRMC was 12% , 2 patients have ( two ) bilateral MRMC and 10 patients have a unilateral canal, there was asignificant difference between two sides (left and right), the right side was 64.29% and left 35.71%, regarding to gender also there was a significant difference , female 33.3% and male 66.7%. In this study there were three types of MRMC and there was a significant difference between them, the mean length (hight) was 11.78 mm and mean horizontaldistance from canal to distal surface of the second molar was 18.5 mm. Conclusions: MRMC also detectedin this study within the global percentage and configurations and should be taken with consideration in oral surgical procedures and radiological interpretations

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
A reliable numerical simulation technique for solving COVID-19 model
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
A Fully Computerized Method to Backup the Router Configuration File
...Show More Authors

This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.

    The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).

View Publication Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Sliding Mode Vibration Suppression Control Design for a Smart Beam
...Show More Authors

Active vibration control is the main problem in different structure. Smart material like piezoelectric make a structure smart, adaptive and self-controlling so, they are effective in active vibration control. In this paper piezoelectric elements are used as sensors and actuators in flexible structures for sensing and actuating purposes, and to control the vibration of a cantilever beam by using sliding mode control. The sliding mode controller (SMC) is designed to attenuate the vibration induced by initial tip displacement which is equal to 15 mm.  It is designed based on the balance realization reduction method where three states are selected for the reduced model from the 24th states that describe the c

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
The Collapsible Soil, Types, Mechanism, and identification: A Review Study
...Show More Authors

Collapsible soil has a metastable structure that experiences a large reduction in volume or collapse when wetting. The characteristics of collapsible soil contribute to different problems for infrastructures constructed on its such as cracks and excessive settlement found in buildings, railways channels, bridges, and roads. This paper aims to provide an art review on collapse soil behavior all over the world, type of collapse soil, identification of collapse potential, and factors that affect collapsibility soil. As urban grow in several parts of the world, the collapsible soil will have more get to the water. As a result, there will be an increase in the number of wetting collapse problems, so it's very important to com

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
A Multi-Objective Task Offloading Optimization for Vehicular Fog Computing
...Show More Authors

      Internet of Vehicle (IoV) is one of the most basic branches of the Internet of Things (IoT), which provides many advantages for drivers and passengers to ensure safety and traffic efficiency. Most IoV applications are delay-sensitive and require resources for data storage and computation that cannot be afforded by vehicles. Thus, such tasks are always offloaded to more powerful nodes, like cloud or fog. Vehicular Fog Computing (VFC), which extends cloud computing and brings resources closer to the edge of the network, has the potential to reduce both traffic congestion and load on the cloud. Resources management and allocation process is very critical for satisfying both user and provider needs. However, th

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref