Preferred Language
Articles
/
jbcd-2220
The Effect Of Bracket Ligation Method On Canine Retraction
...Show More Authors

Aim: This study aimed to compare different types of ligation methods to obtain maximum tooth movement with the least undesirable rotation. Methods: Titanium brackets bonded to acrylic canine teeth were ligated to straight stainless steel (SS) archwires using four ligation methods (figure-O and figure-8 elastics, SS ligatures, and Leone Slide ligatures). The teeth with the ligatures in place were stored in a water bath at 37ºC for 1 day, 1 week, 2, 4 or 6 weeks before testing. The teeth were retracted through softened wax along the archwire and the amount of tooth movement and degree of rotation were measured. Results: Slide ligatures showed the highest distance of tooth movement and degree of canine rotation followed by figure-O elastics, while figure-8 elastics showed the least amount of retraction and degree of rotation. SS ligatures showed moderate tooth movement with a minimal degree of rotation. Conclusions: The study recommends the use of loose SS ligatures for canine retraction in sliding mechanics, while Slide elastic ligatures are best used in leveling and aligning stage of crowded teeth since they showed reduced friction with the archwire.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
The effect of deformation parameter of heavy nuclei on level density parameter
...Show More Authors

The possible effect of the collective motion in heavy nuclei has been investigated in the framework of Nilson model. This effect has been searched realistically by calculating the level density, which plays a significant role in the description of the reaction cross sections in the statistical nuclear theory. The nuclear level density parameter for some deformed radioisotopes of (even- even) target nuclei (Dy, W and Os) is calculated, by taking into consideration the collective motion for excitation modes for the observed nuclear spectra near the neutron binding energy. The method employed in the present work assumes equidistant spacing of the collective coupled state bands of the considered isotopes. The present calculated results for f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 13 2017
Journal Name
Journal Of Multidisciplinary Engineering Science Studies (jmess)
The Effect Of Thickness On Some Physical Properties Of CdSe Thin Films
...Show More Authors

Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
The Effect Of Curing Types On Compressive Strength Of High Performance Concrete
...Show More Authors

The present investigation considers the effect of curing temperatures (30, 40, and 50˚C) and curing compound method on compressive strength development of high performance concrete, and compares the results with concrete cured at standard conditions and curing temperature (21˚C). The experimental results showed that at early ages, the rate of strength development at high curing temperature is greater than at lower curing temperature, the maximum increasing percentage in compressive strength is 10.83% at 50C˚ compared with 21C˚ in 7days curing age. However, at later ages, the strength achieved at higher curing temperature has been less, and the maximum percentage of reduction has been 5.70% at curing temperature 50C˚ compared with 21

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Effect of Steel Fibers on the Properties of Refractory Free Cement Concrete
...Show More Authors

Free cement refractory concrete is a type of refractory concrete with replacing alumina cement by bonding materials such as white kaolin, red kaolin and fumed silica. The free cement refractory concrete used in many applications like Petrochemicals, iron furnaces and cement production industries. The research clarifies the effect of steel fibers with two types crimped steel fibers and hooked steel
fibers with percentages 0.5%, 1% and 1.5% by volume from weight of bauxite aggregates. The additions of steel fibers with two types gave good properties in high temperatures where the specimens keep the dimension without failure and the properties made the best. the percentage of increasing for thermal conductivity was 44% for 1.5% crimped

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of increasing the volume of debt on the volume of trading (applied research on a sample of private banks listed on the Iraq Stock Exchange)
...Show More Authors

 

This research worked on identifying the effect of increasing the volume of indebtedness by companies listed on the Iraq Stock Exchange on the trading volume of those companies, and this research included some theoretical concepts related to both debt financing and trading volume, and it represents the research community of the joint-stock companies listed in The Iraq Stock Exchange (the banking sector). As for the research sample, it was deliberately chosen represented by companies with continuous trading without stopping, which reached 10 joint-stock companies, and the period of research was extended during the period 2011-2015, and a set of indicators and financial methods were used In measuring research v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
A Spotlight on the Experience of E-learning as a Learning Method for the Undergraduate Pediatric Nursing Students in Iraq during the COVID-19 Pandemic
...Show More Authors

    The emergence of COVID-19 has resulted in an unprecedented escalation in different aspects of human activities, including medical education. Students and educators across academic institutions have confronted various challenges in following the guidelines of protection against the disease on one hand and accomplishing learning curricula on the other hand. In this short view, we presented our experience in implementing e-learning to the undergraduate nursing students during the present COVID-19 pandemic emphasizing the learning content, barriers, and feedback of students and educators. We hope that this view will trigger the preparedness of nursing faculties in Iraq to deal with this new modality of learning and improve it should t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref