Preferred Language
Articles
/
jbcd-2381
Radiological Evaluation of The Anatomic Characteristic of Lingual Foramina and Their Vascular Canals in The Anterior Region of The Mandible Using Cone Beam Computed Tomography
...Show More Authors

Background: presence of lingual vascular foramina and canals in the interforaminal regionmay increase the risk ofsurgical complications during implant placement or any surgical procedure in this area.Aim of this study is the radiological evaluation of the anatomic characteristic of the lingual foramina and their vascular canals in the anterior of the mandible using cone beam computed tomography. Materials and Methods: Prospective study including 72 Iraqi subjects (31 male and 41 female) ranging from 20 to 59 years, all subjects attended AL- Sharaa dental clinic in AL-Najaf AL-Ashraf city, scanned with CBCT from September 2016 to February 2017. Using 3dimentional and sagittal cross section to detect lingual foramina and their vascular canals. Their presence, number, diameter, position, and orientation were established. Results: Lingual foramina in the anterior mandible were viewed in whole sample. Number of lingual canals varied from (1-5), the average diameter of the canals was (0.81 mm). The average distance from the foramina to the base of the mandible and to the alveolar crest was (13.78 mm) and (16.05mm), respectively. There was no significant correlation found between age and gender on all selected measurements. There was significant association of diameter of lingual foramen with the count, situation, extent and direction of lingual canal through the mandible width. Conclusion: Cone beam computed tomography is an invaluable system in diagnosis and treatment planning of surgical procedures. It help in detection of various anatomic features of mandible like presence of lingual foramen and canals in the anterior mandible.

Crossref
View Publication
Publication Date
Sun May 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Complete (k,r)-Cap in PG(3,p) Over Galois Field GF(4)
...Show More Authors

   The aim of this paper is to construct the (k,r)-caps in the projective 3-space PG(3,p) over Galois field GF(4). We found that the maximum complete (k,2)-cap which is called an                       ovaloid  , exists in PG(3,4) when k = 13. Moreover the maximum (k,3)-caps, (k,4)-caps and   (k,5)-caps. 

View Publication Preview PDF
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Biochemical Study on Anti Thyroid Peroxidase in Type 2 Diabetic patients with thyroid disorders
...Show More Authors

Type 2 diabetes mellitus (T2DM) is the most frequent endocrinal disease commonly associated with thyroid disorders .The study is conducted at the Specialized Center for Endocrinology and Diabetes in Baghdad ,during December 2014 up to October 2015.This study was done to investigate the prevalence of anti- thyroid peroxidase (Anti-TPO) antibody in patients suffered from type 2 diabetes with thyroid disorders .The study groups included a total number of 80 subjects consisting of 60 type 2 diabetic patients divided into 20 hyperthyroidism subjects (group 1) ,20 hypothyroidism subjects (group 2), 20 euthyroidism subjects (group 3) and 20 healthy controls (group 4) . The fasting blood samples were analyzed for (T3,T4,TSH) by using Vitek Immuno d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Arab Journal Of Gasteroenterology
Serum HCV-RNA levels in patients with chronic hepatitis C: correlation with histological features.
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Applied Hematology
Molecular Alterations in IDH 1/2 Genes among Iraqi Adult Acute Myeloid Leukemia Patients
...Show More Authors
BACKGROUND:

The recurrent somatic variations in IDH1/2 genes in AML play imperative roles in epigenetic dysregulation and the pathogenesis of AML, which could be useful prognostic markers for risk stratification.

AIM:

The aim of the study was to detect the frequency of R132 mutations in the IDH1 gene and R140Q mutation in the IDH2 gene with their treatment outcomes.

PATIENTS
... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
Soft power employment strategy in foreign affairs (Eygpt after Mubarak Regime : An Analytical study)
...Show More Authors

(January 25, 2011) represented a real opportunity to bring about fundamental changes in Egyptian foreign policy and to start a new phase that would cut off all the negative and problematic aspects of Egyptian politics in the period before the revolution. Through the employment of Egypt's huge balance and the role of historical is a civilization rooted in the roots of thousands of years and Islamic reference represented over more than a thousand years the Islamic medium of religion in the start of vision and tools to achieve the Egyptian national interest, and safeguarding Egyptian national security in its comprehensive sense. The research attempts to answer a central question: Is there a role for Egyptian soft power in the Islamic world

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 31 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
AN ENHANCED EVOLUTIONARY ALGORITHM WITH LOCAL HEURISTIC APPROACH FOR DETECTING COMMUNITY IN COMPLEX NETWORKS
...Show More Authors

Preview PDF
Scopus (5)
Scopus
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
A Type-2 Fuzzy Sonewhere Dense Set In General Type-2 Fuzzy Topological Space
...Show More Authors

The multiplicity of connotations in any paper does not mean that there is no main objective for that paper and certainly one of these papers is our research the main objective is to introduce a new connotation which is type-2 fuzzy somewhere dense set in general type-2 fuzzy topological space and its relationship with open sets of the connotation type-2 fuzzy set in the same space topology and theories of this connotation.

View Publication Preview PDF
Scopus Crossref