Preferred Language
Articles
/
jbcd-1512
Time of Emergence of Permanent Teeth and Impact of Nutritional Status among 4-15 Years Old Children and Teenagers in Basrah City /Iraq
...Show More Authors

Background: The timing of eruption of permanent teeth is of considerable importance to the dental health planning for diagnostic, preventive and therapeutic measures for children and teenagers. The purposes of this study were to determine timing of maxillary and mandibular permanent teeth emergence (except third molars) and to evaluate the effect nutritional status by anthropometric measures on the eruption time of permanent teeth, investigations had been done according to jaw and gender variations. Materials and Methods: This study was conducted among four to fifteen years old children and teenagers from kindergarten and schools in Basrah city in the south region of Iraq. The total sample composed of 1807 children and teenagers that were collected randomly from kindergartens, primary and secondary schools in Basrah city. The data were statistically analyzed by using probit model in order to compute the median 5th and 95th percentile range of emergence. Athropmetric measures of height and weight were used for the purpose of assessment of nutritional status. The indices include: Weight for age, Height for age and Weight for height; each was considered as in term of standard deviation score (Z – score) as primary indicator of underweight, stunting and wasting respectively. The statistical significance of differences in mean of a normally distributed variable (nutritional indices z score) between 2 groups was assessed by independent samples t-test. Results: The results showed significant differences (p<0.05) between the timing of maxillary and mandibular teeth emergence in girls and boys, with earlier emergence in girls , also the mandibular teeth emerge before their maxillary opposing teeth in both sexes except for premolars . The prevalence of malnutrition according to height for age, weight for age, and weight for height nutritional status indicators were found to be 7.4 %, 3.7 % and 1.5% respectively. The results showed that among well-nourished children and teenagers described by height for age nutritional status indicator, most teeth were significantly erupted earlier than stunted except the lateral incisor which erupted earlier in stunted boys than well-nourished boys but the difference was not significantly accepted. The greatest difference of median eruption age of permanent teeth between well -nourished and stunted found in girls in the second molar tooth. Conclusions: Records indicated that the Iraqi children exhibit variation in their times of permanent teeth emergence when compared with other studies, and among well-nourished children and teenaged described by height for age nutritional status indicator, most teeth were significantly erupted earlier than stunted children and teenagers.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Pakistan Journal Of Life And Social Sciences (pjlss)
Effect of Aromatherapy on Pain Intensity for Patients Undergoing Arterial Sheath Removal after Percutaneous Coronary Intervention: A Randomized Controlled Trial
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Desalination And Water Treatment
Optimization of chemical oxygen demand removal from petroleum refinery wastewater by electrocoagulation using tubular electrochemical reactor with a novel design
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
Removal of Malachite Green from Aqueous Solution using Ficus Benjamina Activated Carbon-Nonmetal Oxide synthesized by pyro Carbonic Acid Microwave
...Show More Authors

Activated carbon derived from Ficus Binjamina agro-waste synthesized by pyro carbonic acid microwave method and treated with silicon oxide (SiO2) was used to enhance the adsorption capability of the malachite green (MG) dye. Three factors of concentration of dye, time of mixing, and the amount of activated carbon with four levels were used to investigate their effect on the MG removal efficiency. The results show that 0.4 g/L dosage, 80 mg/L dye concentration, and 40 min adsorption duration were found as an optimum conditions for 99.13% removal efficiency. The results also reveal that Freundlich isotherm and the pseudo-second-order kinetic models were the best models to describe the equilibrium adsorption data.

 

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Mon Jul 01 2013
Journal Name
International Journal Of Computer Applications
Mixed Convection in a Square Cavity Filled with Porous Medium with Heated Bottom Wall
...Show More Authors

Two-dimensional unsteady mixed convection in a porous cavity with heated bottom wall is numerically studied in the present paper. The forced flow conditions are imposed by providing a hydrostatic pressure head at the inlet port that is located at the bottom of one of the vertical side walls and an open vent at the top of the other vertical side wall. The Darcy model is adopted to model the fluid flow in the porous medium and the combination effects of hydrostatic pressure head and the heat flux quantity parameters are carefully investigated. These governing parameters are varied over wide ranges and their effect on the heat transfer characteristics is studied in detail. It is found that the time required to reach a desired temperature at th

... Show More
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Statistical Equations to Estimate the In-situ Concrete Compressive Strength from Non-destructive Tests
...Show More Authors

The aim of this study is to propose reliable equations to estimate the in-situ concrete compressive strength from the non-destructive test. Three equations were proposed: the first equation considers the number of rebound hummer only, the second equation consider the ultrasonic pulse velocity only, and the third equation combines the number of rebound hummer and the ultrasonic pulse velocity. The proposed equations were derived from non-linear regression analysis and they were calibrated with the test results of 372 concrete specimens compiled from the literature. The performance of the proposed equations was tested by comparing their strength estimations with those of related existing equations from literature. Comparis

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Statistical Applications In Genetics And Molecular Biology
Mixture model-based association analysis with case-control data in genome wide association studies
...Show More Authors
Abstract<p>Multilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated d</p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
Soft power employment strategy in foreign affairs (Eygpt after Mubarak Regime : An Analytical study)
...Show More Authors

(January 25, 2011) represented a real opportunity to bring about fundamental changes in Egyptian foreign policy and to start a new phase that would cut off all the negative and problematic aspects of Egyptian politics in the period before the revolution. Through the employment of Egypt's huge balance and the role of historical is a civilization rooted in the roots of thousands of years and Islamic reference represented over more than a thousand years the Islamic medium of religion in the start of vision and tools to achieve the Egyptian national interest, and safeguarding Egyptian national security in its comprehensive sense. The research attempts to answer a central question: Is there a role for Egyptian soft power in the Islamic world

... Show More
View Publication Preview PDF
Crossref