Preferred Language
Articles
/
jbcd-606
Oral health status among fifteen years-old students in Maysan governorate\Iraq
...Show More Authors

Background: Dental caries and periodontal disease are the most common and widely spread diseases affecting humans at different ages. Aim of this study is the assessment of prevalence and severity of dental caries, gingivitis, oral hygiene and enamel anomalies in relation to gender and residency among 15 years old students in Maysan governorate –Iraq. Materials and methods: The total sample composed of 750 students (400 males and 350 females, 450 urban and 300 rural) selected randomly from different high schools in the Governorate. Diagnoses and recording dental caries was according to the criteria of WHO (1987), Plaque index of Silness and Loe (1964) was used for plaque assessment, Ramfjord index (1959) was applied for the assessment of calculus, gingival index of Loe and Silness (1963) was followed for recording gingival health condition and criteria of WHO (1997) to assess enamel anomalies. Results: Caries prevalence was found to be (92.53%) of the total sample. The DMFS value was higher among females compared to males with statistically high significant difference (P<0.01) also the value was higher among rural compared to urban with statistically high significant difference (P<0.01). Plaque, gingival and calculus indices were higher among rural than urban and higher among males than females, statistically, there were high significant differences regarding plaque and gingival indices (P<0.01) while non-significant difference regarding calculus index (P>0.05), for both genders and residencies. Conclusion: A high prevalence of dental caries and gingivitis were recorded indicating the need of a public health programs in this governorate.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (19)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Heat And Mass Transfer
Melting enhancement in triplex-tube latent thermal energy storage system using nanoparticles-fins combination
...Show More Authors

View Publication
Scopus (199)
Crossref (192)
Scopus Clarivate Crossref
Publication Date
Thu Dec 11 2014
Journal Name
Sensors
Automatic Frequency Controller for Power Amplifiers Used in Bio-Implanted Applications: Issues and Challenges
...Show More Authors

With the development of communication technologies, the use of wireless systems in biomedical implanted devices has become very useful. Bio-implantable devices are electronic devices which are used for treatment and monitoring brain implants, pacemakers, cochlear implants, retinal implants and so on. The inductive coupling link is used to transmit power and data between the primary and secondary sides of the biomedical implanted system, in which efficient power amplifier is very much needed to ensure the best data transmission rates and low power losses. However, the efficiency of the implanted devices depends on the circuit design, controller, load variation, changes of radio frequency coil’s mutual displacement and coupling coef

... Show More
View Publication
Scopus (21)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Antibacterial activity and mechanism of the silver nanoparticle in gram positive and negative bacteria
...Show More Authors

Biomedical alloy 316L stainless steel enhancing to replace biological tissue or to help stabilize a biological structure, such as bone tissue, enhancing were coated with deposition a thin layer of silver nanoparticles as anti-bacterial materials by using DC- magnetron sputtering device. The morphology surface of The growth nanostructure under the influence of different working pressure were studied by atomic force microscope. The average grain size decrease but roughness of the silver thin layer was increased with‖ ―increasing the working pressure. The thickness of silver thin layer was increased from 107 nm at 0.08 mbar to 126 nm at 1.1 mbar. Antimicrobial activity of silver thin layers at different working pressure were studied. Th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Iraqi Journal Of Hematology
Evaluation of Vitamin D level in thalassemia patients: The experience of a single center
...Show More Authors

XXXX

View Publication Preview PDF
Clarivate Crossref
Publication Date
Thu Jul 03 2025
Journal Name
Circular Economy And Sustainability
Green Supplier Selection in the Iraqi Food Industry: Criteria Analysis and Barriers to Implementation
...Show More Authors

This study explores the barriers to adopting green environmental criteria in Supplier Selection (SS) within the Iraqi food industry. It aims to enhance the understanding of sustainable supply chain management in developing nations, with a particular focus on the Iraqi context. A case study approach was utilized to identify eleven key green environmental criteria and 54 sub-criteria, alongside seven major barriers to their adoption. The Best–Worst Method (BWM) was employed to rank the criteria, and Fuzzy Stepwise Weight Assessment Ratio Analysis (SWARA) was used to prioritize the barriers. The analysis revealed that Environmental Management Systems are the most critical criterion for SS. On the other hand, legislation and policies emerged

... Show More
View Publication
Crossref
Publication Date
Wed Aug 10 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. S Ci.
A Complete (k,r)-Cap in PG(3,p) Over Galois Field GF(4)
...Show More Authors

The aim of t his p aper is t o const ruct t he (k,r)-caps in t he p rojective 3-sp ace PG(3,p ) over Galois field GF(4). We found t hat t he maximum comp let e (k,2)-cap which is called an ovaloid, exist s in PG(3,4) when k = 13. Moreover t he maximum (k,3)-cap s, (k,4)-cap s and (k,5)-caps.

Publication Date
Mon Apr 01 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
The Construction of (k, 3)-Arcs in PG (2, 9) by Using Geometrical Method
...Show More Authors

In this work, we construct projectively distinct (k,3)-arcs in the projective plane PG(2,9) by applying a geometrical method. The cubic curves have been been constructed by using the general equation of the cubic. We found that there are complete (13,3)-arcs, complete (15,3)-arcs and we found that the only (16,3)-arcs lead to maximum completeness

Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Advanced Pharmacy Education And Research
Ultra HPLC method development and validation for the determination of meclizine in pharmaceutical formulation
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref