Preferred Language
Articles
/
ohgziZUBVTCNdQwCT3xt
The Degenerative Condylar Change in Temporomandibular Joint Disorder of Iraqi Population and their Variability Based on Clinical Diagnosis
...Show More Authors

Background: As a multifactorial disorder, temporomandibular joint (TMD) is difficult to diagnose, and multiple factors affect the joint and cause the temporomandibular disorder. Standardization of clinical diagnosis of TMD should be used to reach a definite clinical diagnosis; the condylar bone may degenerate in accordance with these disorders. Aims: Evaluate the correlation between the clinical diagnosis and degenerative condylar change (flattening, sclerosis, erosion, and osteophyte). Materials and Methods: A prospective study with a study group of 97 TMD patients (total of 194 joints) aged 20 to 50. Patients were sent to cone beam computed tomography (CBCT) to assess the degenerative condylar change. Results: No association was found between the clinical diagnosis of TMD with osteophyte and sclerosis. While there was a significant association was found between flattening and erosion and clinical diagnosis. Conclusions: Disc displacement with reduction was the most frequent TMDs. Erosion and flattening were the most frequent bone change found among the different subgroups of clinical diagnosis. Erosion was frequently seen in degenerative joint disease (DJD) with a significant association. While flattening was mostly found in disc displacement without reduction without limited mouth opening (DDwoR without limited) with a significant association.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 21 2020
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
AN EVALUATION OF INVASIVE PEST, RED PALM WEEVIL RHYNCHOPHORUS FERRUGINEUS (OLIVIER, 1790) (COLEOPTERA, CURCULIONIDAE) POPULATION IN IRAQ
...Show More Authors

The Red Palm Weevil (RPW), Rhynchophorus ferrugineus (Olivier, 1790) is a devastating invasive pest of palm trees, invading the Iraqi date palm tree in 2015 for the first time in Safwan county, Basrah province. The Red Palm weevil has been categorized as a quarantine pest of date palm trees worldwide. In this study, a five years monitoring program has been achieved by scouting the invasive pest RPW population in Safwan county by using visual sampling and Pheromone baited traps.
The results indicated that the number of infested palms, increased from 12 trees in 2015 to 111 in 16 orchards in 2016. The number of the infested palms was minimized to 3 trees in the county in 2019 due to the management protocol of the Ministry of Agriculture

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The of Effect Instructional Design based on Kagan Structure In Generating Information Skills for First Intermediate Student’s In Mathematics
...Show More Authors

 

The aim of the research is to identify the effect of instructional design according to Kagan structure among the first intermediate school student’s, and how skills could help in generating information in mathematics. In accordance with the research objectives, the researcher has followed the experimental research method by adopting an experimental design with two equivalent groups of post-test to measure skills in generating information. Accordingly, the researcher raised two main null hypotheses: there were no statistically significant differences at the level of significance (0.05) between the average scores of the experimental group who studied the material according to Kagan structure and th

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Designs of Children's Bedroom Furniture and the Percentage of Its Use in Developing their Aesthetic Sense
...Show More Authors

The research aims to identify the bedroom furniture designs for children who are in ages range between (4-6) years and the rate of employing them in developing their aesthetic sense. To achieve this objective, the researchers developed the two research tools represented by a analysis-description form of bedroom furniture designs included a number of domains that were represented in the shapes, colors, and sizes of the furniture, as well as the availability of the safety factor, ease of use, cleaning and movement. As for the aesthetic sense scale included (30) paragraphs and alternatives (always, sometimes, never), they were distributed among a representative sample of (170) mothers of children were chosen randomly from (17) kindergartens

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
EFFICIENCY OF PARASITOIDS OF PEA LEAFMINER PHYTOMYZA HORTICOLA GOUREAU AND THEIR APPEARANCE TIME IN THE FIELD
...Show More Authors

Eleven hymenopterous species: two braconids, seven eulophids and two pteromalids
parasitized the larvae of Phytomyza horticola Goureau. The activity of the parasites began at
the end of April and evidently increased during May. The female of the parasites fed and
parasitized mostly on the second and third larval instars of P. horticola . Diglyphus iseae
Walker and Cirrospilus vittatus Walker were dominant larval parasites. Chrysocharis
pentheus Walker and Pediobius acantha Walker were main pupal parasites.

View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Diyala Journal Of Engineering Sciences
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New phenolic Schiff bases Derivatives Based on Terephthaladehyde
...Show More Authors

A variety of new phenolic Schiff bases derivatives have been synthesized starting from Terephthaladehyde compound, all proposed structures were supported by FTIR, 1H-NMR, 13C-NMR, Elemental analysis, some derivatives evaluated by Thermal analysis (TGA).

View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Implementation of Power System Stabilizer Based on Conventional and Fuzzy Logic Controllers
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. A suitable PSS model was selected considering the low frequencies oscillation in the inter-area mode based on conventional PSS and Fuzzy Logic Controller. Two types of (FIS) Mamdani and suggeno were considered in this paper. The software of the methods was executed using MATLAB R2015a package.

 

 

View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 30 2024
Journal Name
Iraqi Journal Of Science
Investigation of Flagellum genes FleN and FlgE and Gene Expression of FleN Gene in Pseudomonas Aeruginosa Clinical Isolates
...Show More Authors

The opportunistic multidrug resistance pathogen Pseudomonas aeruginosa has one or several flagella, and the numbers of these sophisticated machines are regulated by the flagellar regulator gene FleN. The flagellar hook gene FlgE is important for its synthesis, motility and tolerance to antibiotics. Bacteriahave resistance to antibiotics, especially to cephalosporin beta-lactam antibiotics. For the current study, 102 clinical specimens were collected and identified using routine laboratory tests and confirmed by Vitek-2 compact system.  A total of 33 isolates of P. aeruginosa were identified. The antibiotic susceptibility test was done by the Vitek 2 Compact system. Flagellar gene detected by conventional PCR revealed that the FleN

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF