Preferred Language
Articles
/
jbcd-610
The relation among ramal width and length with some cervical and cranio-facial measurements in different skeletal classes
...Show More Authors

Background: The purpose of this study was to assess the relation among the ramal length and width with various cervical and cranio-facial measurements for a sample of Iraqi adults with different skeletal classes. Materials and method: The sample composed of 71 Iraqi adults (36 females and 35 males) with an age ranged between 17-30 years and had different skeletal mal-relations using SNA, SNB and ANB to differentiate between them and assorting them into CL.I, CL.II and CL.III mal-relation. Each individual was subjected to clinical examination and digital true lateral cephalometric radiograph that had been analyzed using AutoCAD 2007 software computer program to determine sixteen linear and ten angular measurements. Descriptive statistics were obtained and independent samples t-test was performed to evaluate the gender differences in different classes. ANOVA test as used to compare the measurements among the skeletal classes in each gender, while Pearson’s correlation coefficient test was used to determine the relations among ramal length and width with other measurements in all classes. Results and Conclusions: All of the linear measurements were significantly higher in males than females. On the other hand, the angular measurements showed non-significant gender difference except for SN-PP angle in class II group. ANOVA test showed statistically significant difference in upper gonial angle, Y-axis angle and the mandibular length. Ramal length and width correlated significantly with PFH, SN-MP angle and Co-Gn.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 10 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Science Teachers' Awareness towards Communicable Diseases Control in Baghdad City Primary Schools
...Show More Authors

Objective: To assess of Science Teachers' Awareness towards Communicable Diseases Control in Baghdad City
Primary Schools
Methodology: A descriptive study was conducted, included (100) primary school, (50) in Al-Rassafa sector, and
(50) in Al-Karkh sector, from March 5th 2012 to March 15th 2013, to assess of science teachers' awareness
towards communicable diseases control. A cluster sample of (100) Science teachers (males and females) were
selected, as one teacher from each school. A questionnaire format was used for data collection. The validity of
questionnaire was estimated through a penal of experts related to the field of study, and its reliability was
estimated through a pilot study conducted in (20) schools (

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 09 2020
Journal Name
International Journal Of Agricultural And Statistical Sciences
Host plant resistance, chili pepper to whitefly, Bemisia tabaci (gennadius) (Hemiptera: Aleyrodidae) in field
...Show More Authors

A field study was conducted in Al-Khalis district, Diyala Governorate in 2019 to test the sensitivity of three varieties of pepper to the population density of the whitefly B. tabaci, Anaheim pepper, Aleppo and local variety, and the results showed that the Anaheim variety was the most infested with the whitefly density 4.08 whitefly/ leaf and then the local variety 2.7 whitefly/ leaf. The lowest population density was 1.25 whitefly/ leaf of Aleppo variety. Variety Aleppo also recorded the lowest percentage of whitefly infection B. tabaci of 39.22%, but not have significant differences in the percentage of whitefly infestation, as it reached 53.64% and 54.85% for the Anaheim and local varieties, respectively. The resistance of variety Alepp

... Show More
Scopus (6)
Scopus
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Identifying Average Reservoir Pressure in Multilayered Oil Wells Using Selective Inflow Performance (SIP) Method
...Show More Authors

The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently.  Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r

... Show More
Preview PDF
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
A Pragmatic Analysis of Illocutionary Act in a Selected Presidential Speech on COVID-19
...Show More Authors

     This paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak.  A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.

     What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Exploring Important Factors in Predicting Heart Disease Based on Ensemble- Extra Feature Selection Approach
...Show More Authors

Heart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Construction And Building Materials
Utilization of magnetic water in cementitious adhesive for near-surface mounted CFRP strengthening system
...Show More Authors

Cement-based adhesive (CBA) is used as a bonding agent in Carbon Fibre Reinforced Polymer (CFRP) applications as an alternative to epoxy-based adhesive due to the drawbacks of the epoxy system under severe service conditions which negatively affect the bond between the CFRP and strengthened elements. This paper reports the results of, an investigation carried out to develop two types of CBA using magnetized water (MW) for mixing and curing. Two magnetic devices (MD-I and MD-II), with different magnetic field strengths (9000 and 6000 Gauss) respectively, were employed for water magnetization. Different water flows with different water circulation times in the magnetizer were used for each device. Compressive and splitting tensile strength te

... Show More
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Best Proximity Point Theorem for α ̃–ψ ̃-Contractive Type Mapping in Fuzzy Normed Space
...Show More Authors

The best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Drug Design, Development And Therapy
Prophylactic effects of Clausena excavata Burum. f. leaf extract in ethanol-induced gastric ulcers
...Show More Authors

View Publication
Scopus (45)
Crossref (18)
Scopus Clarivate Crossref