Preferred Language
Articles
/
mxYrXYcBVTCNdQwCmEcC
A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique
...Show More Authors

A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique, Omar Jihad Banawi*, Raghad

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of mandibular third molar position by using computed tomography and reconstructed lateral radiograph
...Show More Authors

Background: Consideration of mandibular third molar is important from orthodontic perspective due to several factors such as, lower anterior arch crowding, relapse in lower anterior region, interference with uprighting of mandibular first and second molars during anchorage preparation and molar distalization. The aims of this study were to assess of gender differences in the mandibular third molar position and compare and evaluate whether there is any differences in the results provided by CT scan and lateral reconstructed radiograph. Materials and Methods: The sample of present study consisted of 39 patients (18 males and 21 females) with age range 11-15 years. CT images for patients who were attending at Al Suwayra General Hospital/the C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Journal Of Craniofacial Surgery
Lateral Ridge Splitting (Expansion) With Immediate Placement of Endosseous Dental Implant Using Piezoelectric Device
...Show More Authors

View Publication
Crossref (15)
Crossref
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Prediction of Ryznar Stability Index for Treated Water of WTPs Located on Al-Karakh Side of Baghdad City using Artificial Neural Network (ANN) Technique
...Show More Authors

In this research an Artificial Neural Network (ANN) technique was applied for the prediction of Ryznar Index (RI) of the flowing water from WTPs in Al-Karakh side (left side) in Baghdad city for year 2013. Three models (ANN1, ANN2 and ANN3) have been developed and tested using data from Baghdad Mayoralty (Amanat Baghdad) including drinking water quality for the period 2004 to 2013. The results indicate that it is quite possible to use an artificial neural networks in predicting the stability index (RI) with a good degree of accuracy. Where ANN 2 model could be used to predict RI for the effluents from Al-Karakh, Al-Qadisiya and Al-Karama WTPs as the highest correlation coefficient were obtained 92.4, 82.9 and 79.1% respe

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Correlation of Penetration Rate with Drilling Parameters For an Iraqi Field Using Mud Logging Data
...Show More Authors

This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Using Adaptive Neuro Fuzzy Inference System to Predict Rate of Penetration from Dynamic Elastic Properties
...Show More Authors

Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal.  The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Sumer Journal For Pure Science
COVID-19Disease Diagnosis using Artificial Intelligence based on Gene Expression: A Review
...Show More Authors

Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Crescent Moon Visibility: A New Criterion using Deep learned Artificial Neural-Network
...Show More Authors

     Many authors investigated the problem of the early visibility of the new crescent moon after the conjunction and proposed many criteria addressing this issue in the literature. This article presented a proposed criterion for early crescent moon sighting based on a deep-learned pattern recognizer artificial neural network (ANN) performance. Moon sight datasets were collected from various sources and used to learn the ANN. The new criterion relied on the crescent width and the arc of vision from the edge of the crescent bright limb. The result of that criterion was a control value indicating the moon's visibility condition, which separated the datasets into four regions: invisible, telescope only, probably visible, and certai

... Show More
Preview PDF
Scopus Crossref