Preferred Language
Articles
/
jbcd-3513
Effect of tea tree oil on candida adherence and surface roughness of heat cure acrylic resin
...Show More Authors

Background: Denture cleansing was an important step that could prevent the spread of infection and improve a patient's health, the durability of the dentures, and the overall quality of life; therefore, it was necessary to choose a suitable cleanser that, in addition to being effective, did not have an unfavorable effect on the qualities of the denture base resin itself when used for an extended period. For this purpose, this study aimed to evaluate the effect of tea tree oil (TTO) on Candida albicans adhesion and the surface roughness property of poly(methyl methacrylate) denture material after immersion in TTO. Methods: A total of 55 heat-cured acrylic resin specimens were used for C. albicans adherence and surface roughness tests. They were distributed into groups (0.25%, 0.5%, 0.75%, and 1%) of TTO, distilled water (DW), and 2% clorhexidine digluconate, totaling five specimens for each group. The specimens were immersed in accordance with their group for 10 minutes. Surface roughness was determined by a profilometer, and C. albicans adherence was determined by measuring optical density with a spectrophotometer. For comparisons between groups for surface roughness and disinfection tests, one-way ANOVA was performed on SPSS program, considering α = 0.05. Results: TTO had a statistically significant effect on C. albicans adhesion to heat-cured acrylic resin (P < 0.05) compared with negative control. Meanwhile, no statistically significant difference was found between 0.75% and 1% TTO concentrations (P > 0.05), whereas the surface roughness test showed a statistically non-significant difference between TTO concentrations and DW (P > 0.05). Conclusions: Immersion of acrylic resin in TTO was effective in decreasing C. albicans adhesion to it, and the greatest decrease was obtained by 1% TTO. The surface roughness test showed a non-significant difference in acrylic roughness after immersion in TTO.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Geopolitical dimensions to build a dam on the downstream Renaissance (Egypt and Sudan)
...Show More Authors

Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
The fundamentalists' position on the absolute prohibition and its impact          In different jurisprudence
...Show More Authors

Praise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
     For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Geminivirus : Detection, Diagnosis And Management
Geminiviruses occurrence in the middle east and their impact on agriculture in Iraq
...Show More Authors

View Publication
Scopus (18)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Deep Learning and Its Role in Diagnosing Heart Diseases Based on Electrocardiography (ECG)
...Show More Authors

Diagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Oct 11 2019
Journal Name
Journal Of The College Of Education For Women
The South Baghdad Electrical Station and its Environmental Impact on the Tigris River
...Show More Authors

The South Baghdad electrical station located on the eastern bank of the Tigris River south of Baghdad city was selected within the municipality of Karrada between  two  latitude ( 3315 , 33 0  18 )North  and  longitude ( 44 0  27 , 44 030 ) East . The purpose of the study is to determine the contribution of the station to the effect of pollution of the Tigris water by taking water samples at the station site and two sites, one before and the other after the station, distributed over time periods of three months between each sample of water and the beginning of August and November Shabat and Mayar and analyzed water samples physically, chemically and biologic

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi Journal Of Science
Paper based glucose biosensor depending on SPCE modified with hemoglobin and silver nanoparticles
...Show More Authors

The direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li

... Show More
Scopus
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref