Preferred Language
Articles
/
jbcd-315
Diagnosis and localization of the maxillary impacted canines by using dental multi-slice computed tomography 3D view and reconstructed panoramic 2D view
...Show More Authors

Background: Diagnosis and treatment planning can be difficult with conventional radiographic methods as the orthodontic-surgical management of impacted canines requires accurate diagnosis and precise localization of the impacted canine and the surrounding structures. This study was aimed to localize and evaluate weather there is any differences in the diagnostic information provided by multi-slice computed tomography three dimensional volumetric CT images and two dimensional reconstructed panorama images (derived from CT) in subjects with impacted maxillary canines. Materials and Methods: Thirty patients including 24 female and 6 male with mean age of 18 years with suspected unilaterally or bilaterally impacted maxillary canines were evaluated on images taken with Brilliance™ 64, Philips multi-detector computed tomography. The spatial relationships of the impacted maxillary canines relative to the adjacent structures was evaluated using linear and angular measurements, and the adjacent lateral incisor root resorption was assessed with three dimensional and two dimensional visualization software. Results: The inclination of the impacted maxillary canine measured to the midline and to the occlusal plane did not differ significantly when it was evaluated using the two imaging modalities. However, there were significant differences between the 3D and 2D images with respect to the impacted maxillary canine vertical height, bucco-palatal localization, and in detecting the proximity and root resorption of the adjacent lateral incisors. Conclusion: Dental CT volumetric images provide more reliable and accurate information for diagnosing the maxillary impacted canine position, inclination, distance from adjacent structures, and detection of lateral incisors rootresorption.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Human Skin WoundWelding Using 980 nm Diode Laser: an in Vitro Experimental Study
...Show More Authors

Laser assisted skin wound closure offers many distinct advantages over conventional closure
techniques. The objective of this in vitro experimental study, carried out at the Institute of Laser for
Postgraduate Studies/Baghdad University, was to determine the effectiveness of 980 nm diode laser in
welding of human skin wounds. Multiple 3-4 cm long full thickness incisions in a specimen of human
skin obtained from the discarded panniculus of an Abdominoplasty operation were tried to be laser
welded using a 4 mm spot diameter laser beam from a 980 nm diode laser at different laser parameters
and modes of action. The tensile strength at the weld site was analyzed experimentally. Although laser
assisted wound welding did

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data
...Show More Authors

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Fri Nov 21 2025
Journal Name
Journal Of Advances In Information Technology
Towards Accurate SDG Research Categorization: A Hybrid Deep Learning Approach Using Scopus Metadata
...Show More Authors

The complexity and variety of language included in policy and academic documents make the automatic classification of research papers based on the United Nations Sustainable Development Goals (SDGs) somewhat difficult. Using both pre-trained and contextual word embeddings to increase semantic understanding, this study presents a complete deep learning pipeline combining Bidirectional Long Short-Term Memory (BiLSTM) and Convolutional Neural Network (CNN) architectures which aims primarily to improve the comprehensibility and accuracy of SDG text classification, thereby enabling more effective policy monitoring and research evaluation. Successful document representation via Global Vector (GloVe), Bidirectional Encoder Representations from Tra

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Urinary Tract Stones Fragmentation using (2100 nm) Holmium: YAG Laser: (In vitro Analysis)
...Show More Authors

Urinary stones are one of the most common painful disorders of the urinary system. Four new technologies have transformed the treatment of urinary stones: Electrohydraulic lithotripsy, ultrasonic lithotripsy, extracorporeal shock wave lithotripsy, and laser lithotripsy.The purpose of this study is to determine whether pulsed holmium laser energy is an effective method for fragmenting urinary tract stones in vitro, and to determine whether stone composition affects the efficacy of holmium laser lithotripsy. Human urinary stones of known composition with different sizes, shapes and colors were used for this study. The weight and the size of each stone were measured. The surgical laser system which used in our study is Ho:YAG laser(2100nm)

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Thu Aug 30 2018
Journal Name
Journal Of Engineering
An Optimum Strategy for Producing Precise GPS Satellite Orbits using Double-Differenced Observations
...Show More Authors

Both the double-differenced and zero-differenced GNSS positioning strategies have been widely used by the geodesists for different geodetic applications which are demanded for reliable and precise positions. A closer inspection of the requirements of these two GNSS positioning techniques, the zero-differenced positioning, which is known as Precise Point Positioning (PPP), has gained a special importance due to three main reasons. Firstly, the effective applications of PPP for geodetic purposes and precise applications depend entirely on the availability of the precise satellite products which consist of precise satellite orbital elements, precise satellite clock corrections, and Earth orientation parameters. Secondly, th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Aug 10 2021
Journal Name
Design Engineering
Lossy Image Compression Using Hybrid Deep Learning Autoencoder Based On kmean Clusteri
...Show More Authors

Image compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye

... Show More