Preferred Language
Articles
/
jbcd-166
Cephalometric analysis of craniofacial deformity of ?-thalassemic major by using computed tomography
...Show More Authors

Background: Thalassemia is a hereditary anemia resulting from defects in hemoglobin production. ?- thalassemia caused by decrease in the production of ?- globin chains affect multiple organs and is associated with cranio-oro-facial deformity which include prominent cheek bones and protrusive premaxilla with depression of the nasal bridge often referred to as “rodent or chip-munk face” with small mandible and Cl.II skeletal relationship. This study aimed to investigate cephalometric craniofacial parameters (skeletal) of ?- thalassemic major patients by using computed tomography and to compare findings with a group of healthy patients in the same age group. Subject, Materials and Method: The study included (40) patients with ?- thalassemic major (20 female and 20 male) with age 8-15years compared with (40) healthy controls (20 female and 20 male) with the same age, who admitted to spiral computed tomography scan unit in X-ray institute in AL-KARKH general hospital to have computed tomography scan for the brain, paranasal and for orthodontic purpose from October 2011 to June 2012. Cephalometric analysis of the selected four skeletal linear measurements and four skeletal angular measurements, by using direct analysis with software programs in a computer which is part of the computed tomography machine. Results: There was no statistically significant difference between thalassemic males and females in all selected skeletal linear and angular measurements, Thalassemic patients have a highly significant large ANB angle and cl II skeletal relationship, significant larger gonial angle, Mandibular base length (Me-Go) is significantly shorter, Retrognathic mandible (SNB) is significantly decreased, highly significant shorter in total anterior facial height (N-Me) and total posterior facial height (S-Go), and also the Ramus height is highly significant decreased. Conclusion: In thalassemic patients, the skeletal morphology is recognizable and mandible is retrognathism and they have skeletal cl. II pattern and Computed tomography is useful tool for assessment of the cranio facial measurement.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Shell and Double Concentric Tube Heat Exchanger Calculations and Analysis
...Show More Authors

This study concerns a new type of heat exchangers, which is that of shell-and-double concentric tube heat exchangers. The case studies include both design calculations and performance calculations.

       The new heat exchanger design was conducted according to Kern method. The volumetric flow rates were 3.6 m3/h and 7.63 m3/h for the hot oil and water respectively. The experimental parameters studied were: temperature, flow rate of hot oil, flow rate of cold water and pressure drop.

A comparison was made for the theoretical and experimental results and it was found that the percentage error for the hot oil outlet temperature was (- 1.6%). The percentage

... Show More
View Publication
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Economic Analysis for Construction in Ibn Khalduon s’ Muqaddimah
...Show More Authors

The specialist researcher  fined the relations between economic ideas with economic facts in his theory which called humanity building it is appeared clearly ( in Ibn Khalduons’ Muqaddimah) in a clothe of economic  social  phenomenon's as a systematical analysis in all fifty chapters of al Muqaddimah ,therefore this paper deal with  Ibn Khalduon economic thoughts as important says which describe the society building in its economic subjective  and  examine the relationship between The dissert and the city within economic says which are cover  the social analysis ,and determinate   the analysis objects  which clearly in this dualism  model ,between the state and economic bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Finite Element Analysis for the Damaged Rotating Composite Blade
...Show More Authors

In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included.  The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Iraqi stock market structure analysis based on minimum spanning tree
...Show More Authors

tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.

View Publication
Scopus Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Experimentation in caves painting (A comparative analysis): فريد خالد علوان
...Show More Authors

Addressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 26 2017
Journal Name
Separation Science And Technology
Schiff bases and their complexes: Recent progress in thermal analysis
...Show More Authors

Schiff bases are versatile compounds synthesized from the condensation of primary amino compounds with aldehydes or ketones. The high thermal of many Schiff base and their complexes were useful attributes for their application as catalysts in reactions involving at high temperatures. This thermal behavior of Schiff bases and their complexes was evaluated by TGA/DTG and DTA curves with 10 mass losses related to dehydration and decomposition. This review summarizes the developments in the last decade for thermal analysis of Schiff bases. Therefore, synthesis of Schiff bases and their complexes are reviewe

View Publication Preview PDF
Scopus (61)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Mar 20 2018
Journal Name
Day 3 Thu, March 22, 2018
Southern Iraqi Oil Fields Drilling Problems Identification, Analysis, and Treatment
...Show More Authors
Abstract<p>Multiple drilling problems are being faced continuously while drilling wells in the southern Iraqi oil fields. Many of which are handled poorly and inefficiently which yields longer non-productive time due to the lack of knowledge about the source of these problems. This study aims to investigate the Basra oil fields formations from Faris to Mishrif, diagnose the potential problems, and present the optimum treatment for each problem.</p><p>Gathering of field data and previous studies on the subject, in addition to the field experience of drilling supervisors were all the information bases of this study. Southern Iraqi oil fields were studied and analyzed care</p> ... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref