Preferred Language
Articles
/
jbcd-2731
Early impact of fixed orthodontic therapy on gingival health status in relation to weight status

Background: fixed orthodontic appliances deleterious influence on gingival health is well documented. Association between weight status and gingival health is presented in many studies. This study aimed to evaluate how early the impact of fixed orthodontic therapy on patients` gingival health, and if there are differences of that impact among different weight status groups. Materials and Methods: Sample consisted of 54 patients (25 males, 29 females; age limits are 16 -18 years) going under the course of treatment with fixed orthodontic appliance. Patients were categorized according to their Body Mass Index (BMI) into 3 weight status groups considering WHO charts in 2007 (underweight, normal weight, overweight and obese), then determination of each patient`s gingival health status was through the criteria of the gingival index (GI) by Loe and Silness in 1963 which modified by Loe in 1967. Records of gingival index for all patients who met specific criteria were taken in three time points [before bonding (1st visit), 2 weeks after bonding (2nd visit), and 4 weeks after bonding (3rd visit)]. Also BMI of the patients were checked at each of the three visits. Results: There was a significant increase in gingival index for all BMI weight status groups after just two weeks of treatment, and the increase continues during the 3rd visit, with no significant difference in impact among weight status groups. Conclusions: oral health preventive measures should be applied rapidly and equally to all patients treated with fixed orthodontic appliances, without taking their BMI weight status in consideration.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
Scopus (36)
Crossref (32)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
The Eff ffectt off Septtopllastty on IInfferr iiorr Turrbiinatte Siize

Bac kground:: Septal deviation is one of the commonest anatomical deformities of the nasal skeleton, this deviation is usually accompanied by compensatory hypertrophy of the inferior turbinate on the concave side that will accentuate the severity of nasal obstruction.
Objectives: To evaluate the effect of septoplasty on the size of the inferior turbinate in patients with nasal septum deviation.
Methods: This is a prospective study of 25 patients attending the otolaryngological department at Al-Jirahat teaching hospital from September 2011 to November 2013, complaining mainly of nasal obstruction. Otolaryngological examination had shown nasal septum deviation. The cross sectional areas of inferior turbinates were measured with compu

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
Crossref (4)
Crossref
View Publication
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Sun Jun 24 2018
Journal Name
2018 Aiaa/ceas Aeroacoustics Conference
Scopus (1)
Scopus Crossref
View Publication
Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Printed Arabic Characters Recognition Based on Minimum Distance Classifier Technique

     The printed Arabic character recognition are faced numerous challenges due to its character body which are changed depending on its position in any sentence (at beginning or in the middle or in the end of the word). This paper portrays recognition strategies. These strategies depend on new pre-processing processes, extraction the structural and numerical features to build databases for printed alphabetical Arabic characters. The database information that obtained from features extracted was applied in recognition stage. Minimum Distance Classifier technique (MDC) was used to classify and train the classes of characters. The procedure of one character against all characters (OAA) was used in determination the rate

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic

   This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Programming a Pneumatic Processes Sequence based on PLC by Demonstration

Abstract

Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h

... Show More
Crossref
View Publication Preview PDF