Preferred Language
Articles
/
jbcd-2220
The Effect Of Bracket Ligation Method On Canine Retraction
...Show More Authors

Aim: This study aimed to compare different types of ligation methods to obtain maximum tooth movement with the least undesirable rotation. Methods: Titanium brackets bonded to acrylic canine teeth were ligated to straight stainless steel (SS) archwires using four ligation methods (figure-O and figure-8 elastics, SS ligatures, and Leone Slide ligatures). The teeth with the ligatures in place were stored in a water bath at 37ºC for 1 day, 1 week, 2, 4 or 6 weeks before testing. The teeth were retracted through softened wax along the archwire and the amount of tooth movement and degree of rotation were measured. Results: Slide ligatures showed the highest distance of tooth movement and degree of canine rotation followed by figure-O elastics, while figure-8 elastics showed the least amount of retraction and degree of rotation. SS ligatures showed moderate tooth movement with a minimal degree of rotation. Conclusions: The study recommends the use of loose SS ligatures for canine retraction in sliding mechanics, while Slide elastic ligatures are best used in leveling and aligning stage of crowded teeth since they showed reduced friction with the archwire.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Evaluation the fermentation capacity of commercial Baker′s yeast and effect of the salt concentration on breadLeavening.: Evaluation the fermentation capacity of commercial Baker′s yeast and effect of the salt concentration on breadLeavening.
...Show More Authors

This qualitative study was conducted on eight types of commercial baking yeast which available in local markets to estimate their fermentation activity as affecting the Bread industry and the impact of the salt added to DoughLeavening, The results showed a great variation in the fermentation capacity of yeast samples (their role in swelling the dough), most notably the sample value Y3 and least sample Y7 and reached 80% and 20% respectively, and the value of Leavening by using the two types of yeast with addition of three levels of salt (0 , 1 and 2%) have 20.0 , 19.7 and 15.7 of the sample Y3, compared with 10.5 , 10.3 and 8.8 of the sample Y7 for each of the levels of salt respectively, reflect

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 17 2024
Journal Name
Evolutionary Studies In Imaginative Culture
The Effect of the Siberian Air Altitude on the Characteristics of the Climate of the Northern Arabian Peninsula
...Show More Authors

The field of climatic geography focuses on the study of the Earth's surrounding atmosphere, particularly the lower (surface) part close to the Earth's surface. This field examines the interactions within the atmosphere resulting from the solar radiation that reaches the Earth and the subsequent distribution of atmospheric pressure. Consequently, certain surface pressure systems, both high and low, emerge and vary in their temporal and spatial impacts on the climate of the Arabian Peninsula. Therefore, it is essential to conduct a comprehensive and detailed study to understand the causes, development, movement, geographical distribution, and monthly and seasonal recurrence of these pressure systems. For this purpose, a minor climatic

... Show More
View Publication
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Study on the Effect of the Curvature of Solar Collector on Wind Loading Coefficients and Dynamic Response of Solar Collector
...Show More Authors

In the current research, the work concentrated on studying the effect of curvature of solar parabolic trough solar collector on wind loading coefficients and dynamic response of solar collector. The response of collector to the aerodynamic loading was estimated numerically and experimentally. The curvature of most public parabolic trough solar collectors was investigated and compared. The dynamic response of solar collector due to wind loading was investigated by using numerical solution of fluid-structure interaction concept. The experimental work was done to verify the numerical results and shows good agreement with numerical results. The numerical results were obtained by using finite element software package (ANSYS 14). It was found

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of SPAWN Strategy on the Life Skills among the Second Grade Intermediate Students
...Show More Authors

The aim of the research is to find out the effect of the SPAWN strategy on the life skills of second-intermediate-grade students. This study stage represented the research community within the intermediate and secondary governmental daytime schools affiliated with the Directorate of Education of Diwaniyah. The experiment was applied in Al-Razai Intermediate School on a sample of second-grade intermediate students, including 66 students distributed into two groups: (32) students within the experimental group and (34) students within the control group. The two groups were equivalent with a number of variables (chronological age, intelligence test, previous information test, life skills scale). The results indicated that the two groups were

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 05 2015
Journal Name
Scientific Education
The effect of the KWLH strategy on the reading comprehension of first-year intermediate female students
...Show More Authors

Preview PDF
Publication Date
Fri Dec 22 2023
Journal Name
Journal Of Optics
Studying the effect of adding Mo on the optical and structural properties of the CoFe2O4 compound
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref