Preferred Language
Articles
/
jbcd-315
Diagnosis and localization of the maxillary impacted canines by using dental multi-slice computed tomography 3D view and reconstructed panoramic 2D view
...Show More Authors

Background: Diagnosis and treatment planning can be difficult with conventional radiographic methods as the orthodontic-surgical management of impacted canines requires accurate diagnosis and precise localization of the impacted canine and the surrounding structures. This study was aimed to localize and evaluate weather there is any differences in the diagnostic information provided by multi-slice computed tomography three dimensional volumetric CT images and two dimensional reconstructed panorama images (derived from CT) in subjects with impacted maxillary canines. Materials and Methods: Thirty patients including 24 female and 6 male with mean age of 18 years with suspected unilaterally or bilaterally impacted maxillary canines were evaluated on images taken with Brilliance™ 64, Philips multi-detector computed tomography. The spatial relationships of the impacted maxillary canines relative to the adjacent structures was evaluated using linear and angular measurements, and the adjacent lateral incisor root resorption was assessed with three dimensional and two dimensional visualization software. Results: The inclination of the impacted maxillary canine measured to the midline and to the occlusal plane did not differ significantly when it was evaluated using the two imaging modalities. However, there were significant differences between the 3D and 2D images with respect to the impacted maxillary canine vertical height, bucco-palatal localization, and in detecting the proximity and root resorption of the adjacent lateral incisors. Conclusion: Dental CT volumetric images provide more reliable and accurate information for diagnosing the maxillary impacted canine position, inclination, distance from adjacent structures, and detection of lateral incisors rootresorption.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Improving Accuracy in Human Age Classification Using Ensemble Learning Techniques
...Show More Authors

     Age is a predominant parameter for arbitrating an individual, for security and access concerns of the data that exist in cyber space. Nowadays we find a rapid growth in unethical practices from youngsters as well as skilled cyber users. Facial image renders a variety of information that can be used, when processed to ascertain the age of individuals. In this paper, local facial features are considered to predict the age group, where local Binary Pattern (LBP) is extracted from four regions of facial images. The prominent areas where wrinkles are developed naturally in human as age increases are taken for feature extraction. Further these feature vectors are subjected to  ensemble techniques that increases th

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Drag Reduction Using Passive Methods on KIA PRIDE Car Model
...Show More Authors

An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 02 2024
Journal Name
Iraqi Journal Of Science
Using Sensitivity Analysis in Linear Programming with Practical Physical Applications
...Show More Authors

Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan

... Show More
Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Health Monitoring For Cantilever Crane Frame Using Residual Error Method
...Show More Authors

          In the present research, a crane frame has been investigated by using finite element method. The damage is simulated by reducing the stiffness of assumed elements with ratios (10% and 20 %) in mid- span of the vertical column in crane frame. The cracked beam with a one-edge and non-propagating crack has been used. Six cases of damage are modeled for crane frame and by introducing cracked elements at different locations with ratio of depth of crack to the height of the beam (a/h) 0.1, 0.20. A FEM program coded in Matlab 6.5 was used to model the numerical simulation of the damage scenarios. The results showed a decreasing in the five natural frequencies from undamaged beam which means

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Different methods for characterizing surface roughness using laser speckle technique
...Show More Authors

In this work, results from an optical technique (laser speckle technique) for measuring surface roughness was done by using statistical properties of speckle pattern from the point of view of computer image texture analysis. Four calibration relationships were used to cover wide range of measurement with the same laser speckle technique. The first one is based on intensity contrast of the speckle, the second is based on analysis of speckle binary image,  the third is on size of speckle pattern spot, and the latest one is based on characterization of the energy feature of the gray level co-occurrence matrices for the speckle pattern. By these calibration relationships surface roughness of an object surface can be evaluated within the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of Pure And Applied Mathematics
Linear Regression Model Using Bayesian Approach for Iraqi Unemployment Rate
...Show More Authors

In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on th

... Show More
Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref