Preferred Language
Articles
/
jbcd-186
Soft tissue facial profile analysis of adult Iraqis with different classes of malocclusion
...Show More Authors

Background: Complete analysis of facial profile should also include an evaluation of soft tissue morphology. Materials and Method:The sample consisted of 90 Iraqi adults (45 males and 45 females) aged 18-25 years from Baghdad city divided into 3 groups according to the ANB angle with 30 subjects in each group (15 males and 15 females) for class I, II and III. Lateral cephalometric radiograph was taken for each subject and 8 angular and 5 linear measurements were identified and determined, t-test, ANOVA and LSD test were used to compare between both genders and between different classes. Results:Showed that females had greater angular measurements and smaller linear measurements with more lip prominence than males in all classes, there was more convex facial profile with more prominent forehead, more prominent tip of the nose with increased facial heights and more prominent lips in class II subjects than in class I and IIIsubjects. Conclusion: There is wide variation in soft tissue facial profile among different classes of malocclusion and careful determination of the components of soft tissue facial profile is very important in the diagnosis and treatment planning.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Archives Of Razi Institute
Molecular Analysis of fimA Operon Genes among UPEC Local Isolates in Baghdad City
...Show More Authors

Specialized Escherichia coli (E. coli) isolates, called uropathogenic E. coli (UPEC), cause most of urinary tract infections (UITs). Once bacteria reached the urinary tract of the host, they have to adhere to the host cell for the colonization. For this purpose, bacteria have different structures including fimbrial adhesins. Most of the UPECs contain type 1 fimbriae encoded by fim operon (fimB, E, A, I, C, D, F, G, H) which is responsible for the adhesive ability in these isolates. Ninety-four isolates of UPEC were obtained from UTI patients in Baghdad hospitals and their diagnosis were confirmed by the PCR method using 16srDNA as a housekeeping gene. The UPEC isolates were tested for their ability of adherence to the urothelial cells obtai

... Show More
View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Structural Durability & Health Monitoring
Seismic Analysis of Reinforced Concrete Silos under Far-Field and Near-Fault Earthquakes
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Performance Analysis of Four Conceptual Designs for the Air Based Photovoltaic / Thermal Collectors
...Show More Authors

The  thermal  and  electrical  performance  of  different  designs  of  air  based  hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 29 2024
Journal Name
مجلة العلوم التربوية والنفسية
Needs in the stories of the Brothers Grimm (a study in content analysis)
...Show More Authors

The current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw

... Show More
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Spatial and Temporal Analysis of Severe Dust Storm in Iraq in May 2022
...Show More Authors

Dust storms are a common ecological occurrence in many world‘s countries, mainly in dry and semi-dry parts. Dust storms tremendously influence human health, the environment, the climate, and numerous social aspects. In this paper, spatial and temporal analysis, metrological triggers, and trajectory, dust exporting areas of a severe dust storm that occurred in Iraq on May 16, 2022, were investigated. The dust storm's backward trajectory was determined using HYSPLIT model, which is then compared with MODIS and Meteosat satellite images. The weather is then analyzed using the NCEP/NCAR Reanalysis model, and the approximate area of these sources was determined using Landsat 8 satellite image classification method. The results revealed

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Modeling and analysis of thermal contrast based on LST algorithm for Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
discriminate analysis and logistic regression existence of multicolleniarty problem(Empirical Study on Anemia)
...Show More Authors

The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.

In this, search the comparison between binary lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Aip Conference Proceedings
COMPARATIVE ANALYSIS OF IMMUNE CELLS ACTIVATION AND CYTOTOXICITY UPON EXPOSURE PATHOGEN AND GLYCOCONJUGATES
...Show More Authors

View Publication
Scopus Clarivate Crossref