Preferred Language
Articles
/
jbcd-460
Early detection of periodontitis among young adult cigarette smokers and non-smokers using cone beam computed tomography
...Show More Authors

Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth except the third molar while the radiographic analysis using CBCT was recorded on the Ramfjord teeth, the unit of measurement was from cement-enamel junction to alveolar crest distance (CEJ-Ac distance) per site in millimeters. Results: The results obtained were a non significant difference for PLI, a significant difference of mean of GI between young smokers and non smokers. There was a highly significant difference in the general mean of CEJ-Ac distance between both groups. There was a significant difference between maxillary and mandibular teeth, a non significant difference between right and left sides among young smokers and non smokers. Conclusion: The CBCT device plays an important role in detection the incipient form of periodontitis among young smokers and non-smokers, so we concluded that there is a highly significant difference in the general mean CEJ-Ac distance between young smokers and non smokers with increase distance in the maxillary teeth than that in the mandibular teeth.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 09 2021
Journal Name
Applied System Innovation
Design and Optimization of Vertical Axis Wind Turbines Using QBlade
...Show More Authors

Wind energy is considered one of the most important sources of renewable energy in the world, because it contributes to reducing the negative effects on the environment. The most important types of wind turbines are horizontal and vertical axis wind turbines. This work presents the full details of design for vertical axis wind turbine (VAWT) and how to find the optimal values of necessary factors. Additionally, the results shed light on the efficiency and performance of the VAWT under different working conditions. It was taken into consideration the variety of surrounding environmental conditions (such as density and viscosity of fluid, number of elements of the blade, etc.) to simulate the working of vertical wind turbines under di

... Show More
Scopus (23)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Wed Mar 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Detection of Single Nucleotide Polymorphisms (SNPs) for Genes Cause Drug-Resistant in Iraqi Mycobacterium Tuberculosis isolates by new Pyrophosphate Technique.
...Show More Authors

In this search, a new pyrophosphate technique was proved. The technique was employed to single- nucleotide polymorphisms (SNPs), which diagnosis using a one-base extension reaction. Three Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad.; also one specimen was used as a negative control. The steps of this technique were by used a specific primer within each aliquot that has a short 3-OH end of the base of the target gene that was hybridized to the single-stranded DNA template. Then, the Taq polymerase enzyme and one of either α-thio-dATP, dTTP, dGTP, or dCTP

... Show More
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Tue Mar 07 2017
Journal Name
The First International Conference For Engineering Research
Colony Counting Using iPad and iPhone Applications
...Show More Authors

Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Prevalence of Depression among Mothers of Children with Type 1 Diabetes Mellitus attending two Diabetes Centers
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
The Iraqi Postgraduate Medical Journal
Acceptance of COVID19 Vaccines among Health Care Workers in Al Risafa Directorate of Health in Baghdad
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
Awareness Level of the Hidden Curriculum among Field Education Students at College of Education, Ha'il University
...Show More Authors

The study aimed to identify the awareness level of hidden curriculum among field education students, College of Education, Hail University. To identify the different awareness level of hidden curriculum among field education students depending on specialization variable, and grade variable in curriculum and instruction course, a descriptive survey method was used. The study sample consisted of (182) students: 78 students in Islamic Culture major, 46 primary major and 58 in physical education. To achieve the study objectives, a hidden curriculum awareness scale was designed included (36) items. The study results showed: the awareness level of hidden curriculum among students of field education, Education College, Hail University, achieved

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Social Factors for Delaying the Age of Marriage among Working-Women at the University of Baghdad
...Show More Authors

The phenomenon of delayed marriage triggered the intention of most researchers and specialists to reveal the social factors associated with the spread of this phenomenon in order to identify the characteristics of that phenomenon and the social factors resulting from it. Thus, the current research aims to identify the social factors most related to the delay in marriage age among working-women at the University of Baghdad, represented by family factors, economic factors-professional, psychological factors – subjective, and environmental factors. The researcher also aims to identify the differences in social factors associated with late marriage age for working women at the University of Baghdad in terms of the type of profession (teach

... Show More
View Publication Preview PDF