Preferred Language
Articles
/
jbcd-523
Stem cells a novel approach to periodontal regeneration (A review of literature)
...Show More Authors

In this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon May 01 2023
Journal Name
Chemical Engineering Research And Design
Treatment of petroleum refinery wastewater by electrofenton process using a low cost porous graphite air-diffusion cathode with a novel design
...Show More Authors

View Publication
Scopus (30)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Acta Logistica
A business continuity-based framework for risk management in smart supply chains: a fuzzy multi-criteria decision-making approach
...Show More Authors

The aim of this study is to develop a novel framework for managing risks in smart supply chains by enhancing business continuity and resilience against potential disruptions. This research addresses the growing uncertainty in supply chain environments, driven by both natural phenomena-such as pandemics and earthquakes—and human-induced events, including wars, political upheavals, and societal transformations. Recognizing that traditional risk management approaches are insufficient in such dynamic contexts, the study proposes an adaptive framework that integrates proactive and remedial measures for effective risk mitigation. A fuzzy risk matrix is employed to assess and analyze uncertainties, facilitating the identification of disr

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences & Humanities
HRM Management Approaches, With a Focus on Employee Centric Approach: A Case Study In The Rafidain Bank In Iraq
...Show More Authors

This research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th

... Show More
View Publication
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
THE MORPHOLOGICAL CHANGE IN SUNFLOWER PLANT UNDER HARDENING CONDITIONS TO DROUGHT TOLERANCE . I. PLANT HEIGHT AND STEM DIAMETER
...Show More Authors

The objective of the work was to study the changes in height and stem diameter of sunflower plants during growth stages under hardening conditions to drought tolerance. Field experiments were carried out during the spring season of 2000 and2001. Agricultural practices were made according to recommendations.Asplit-split plots design was used with three replications.The main plots included irrigation treatments:irrigation to100%(full irrigation),75and50%of available water.The sub plots were the cultivars Euroflor and Flame.The sub-sub plots represented four seed soaking treatments:Control(unsoaking), soaking in water ,Paclobutrazol solution(250ppm),and Pix solution(500ppm). The soaking continued for 24 hours then seeds were dried at room

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 18 2019
Journal Name
British Journal Of Neurosurgery
An enemy hides in the ceiling; pediatric traumatic brain injury caused by metallic ceiling fan: Case series and literature review
...Show More Authors

Purpose: We report a series of 29 pediatric patients who sustained head injuries due to metallic ceiling fans. They all were admitted to the Emergency Department of Neurosurgery Teaching Hospital in Baghdad, Iraq, during January 2015 to January 2017. Results: Pediatric ceiling fan head injuries are characterized by four traits which distinguish them from other types of head injuries; 1- Most of them were because of climbing on or jumping from furniture between the ages of two and five. 2- Most of them sustained compound depressed skull fracture which associated with intracranial lesions and pneumocephalus. 3- The most common indication for surgical intervention was because of dirty wound which mixed with hairs. 4- These variables were stati

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Analytical Methods In Environmental Chemistry Journal
Design a continuous microfluidic flow cell for turbidimetric-flow injection technology: A new approach for routine analysis of active pharmaceutical formulations
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison of periodontal health status in relation to IQ in right- and left handed individuals
...Show More Authors

Background: Periodontal disease (PD) is a chronic inflammatory condition characterized by destruction of supporting structures of the teeth. Intelligence quotient (IQ) was potentially reported to significantly associated with prevalence of gingivitis. Mild gingivitis was obtained in high IQ levels while moderate gingivitis may be attributed to poor oral hygiene seen among the subjects having low IQ levels. Method: One hundred volunteers aged between 20-45 years old were enrolled in this study, patients were equally divided into right- and left-handed (50 patients each)and each group then subdivided into patients with healthy gingiva(10), patients with gingivitis (20), and patients suffering from periodontitis (20).An IQ questionnaire was p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref