Preferred Language
Articles
/
kxYQXYcBVTCNdQwCvEe-
Knowledge and Attitude of Iraqi Dentists towards the Use of Cone Beam Computed Tomography in Endodontics: A Questionnaire Study
...Show More Authors

Objective: The aim of this study was to assess the knowledge and attitude of Iraqi dentists towards cone beam computed tomography (CBCT) applications in endodontics by using an online survey. Materials and Methods: A questionnaire, consisting of 31 questions, targeted general dental practitioners and specialists in different dental specialities. A total of 306 participants were included. Data were assessed according to the frequency of distribution and the chi-square test was applied to analyse the difference in responses between two independent groups. Results: Among the participants 63.4% were using digital radiography in their daily practice, and 84% had awareness about CBCT's uses, with higher statistically significant responses among endodontists. About 51.4% of participants gained their CBCT knowledge from lectures, while 79.4% believed that continuous education courses enhance knowledge of CBCT. Nearly 75% of participants agreed on the accuracy of CBCT rather than periapical radiography in detecting endodontic conditions. However, most participants responded that CBCT would be used selectively in their future routine practice. Conclusions: This questionnaire showed that Iraqi dentists have a very good knowledge regarding indications and limitations of CBCT in endodontics. However, there is a lack of structured teaching and practical training on the use of CBCT within dental schools. The development of CBCT training programmes and increasing the availability of CBCT machines within dental schools are strongly supported by the results of this survey

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Oct 10 2025
Journal Name
Journal Of Visualized Experiments
Explainable AI for Visual Inspection: A Comparative Analysis and Review
...Show More Authors

Explainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jun 25 2024
Journal Name
Biomedical And Pharmacology Journal
Psidium guajava: A Review on Its Pharmacological and Phytochemical Constituents
...Show More Authors

Psidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl

... Show More
View Publication
Scopus (9)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Evaluation the fermentation capacity of commercial Baker′s yeast and effect of the salt concentration on breadLeavening.: Evaluation the fermentation capacity of commercial Baker′s yeast and effect of the salt concentration on breadLeavening.
...Show More Authors

This qualitative study was conducted on eight types of commercial baking yeast which available in local markets to estimate their fermentation activity as affecting the Bread industry and the impact of the salt added to DoughLeavening, The results showed a great variation in the fermentation capacity of yeast samples (their role in swelling the dough), most notably the sample value Y3 and least sample Y7 and reached 80% and 20% respectively, and the value of Leavening by using the two types of yeast with addition of three levels of salt (0 , 1 and 2%) have 20.0 , 19.7 and 15.7 of the sample Y3, compared with 10.5 , 10.3 and 8.8 of the sample Y7 for each of the levels of salt respectively, reflect

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 23 2023
Journal Name
Journal Of Optics
Studying the effect of cadmium chloride and thiourea concentrations on the structural and optical properties of CdS films deposited using the spray pyrolysis technique
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Journal Of Economics And Administrative Sciences
A Modified Fama-MacBeth Model based on the Single-Index Model
...Show More Authors

The aim of this essay is to use a single-index model in developing and adjusting Fama-MacBeth.  Penalized smoothing spline regression technique (SIMPLS) foresaw this adjustment.  Two generalized cross-validation techniques, Generalized Cross Validation Grid (GGCV) and Generalized Cross Validation Fast (FGCV), anticipated the regular value of smoothing covered under this technique. Due to the two-steps nature of the Fama-MacBeth model, this estimation generated four estimates: SIMPLS(FGCV) - SIMPLS(FGCV), SIMPLS(FGCV) - SIM PLS(GGCV), SIMPLS(GGCV) - SIMPLS(FGCV), SIM PLS(GGCV) - SIM PLS(GGCV). Three-factor Fama-French model—market risk premium, size factor, value factor, and their implication for excess stock returns and portfolio return

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
The suggested threshold to reduce data noise for a factorial experiment
...Show More Authors

In this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of observations, where the design of experiments is used to study the effect of transactions on experimental units and thus obtain data representing experiment observations that The difference in the application of these transactions under different environmental and experimental conditions It causes noise that affects the observation value and thus an increase in the mean square error of the experiment, and to reduce this noise, multiple wavelet reduction was used as a filter for the observations by suggesting an improved threshold that takes into account the different transformation levels based on the logarithm of the b

... Show More
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus (1)
Scopus
Publication Date
Sat Dec 06 2025
Journal Name
Journal Of The College Of Education
A New Text from Ur III dynasty on Ba’aga, the fattener
...Show More Authors

يعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref