Preferred Language
Articles
/
sRZPQ4cBVTCNdQwCBD6k
Comparison of the accuracy of intraoral digital impression system and conventional impression techniques for multiple implants in the full-arch edentulous mandible
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Shift towards Digital Education According to Vision 2030 in Light of Some Variables from the Perspective of Workers with Disabilities
...Show More Authors

The current study aimed to measure the attitudes of female teachers towards the use of digital learning and the degree of possessing their digital education skills. The study sample consisted of (180) workers with disabilities (mental disability، auditory impairment، visual disability، hyperactivity and distraction. To achieve the goals of the study, the transformation measure was used towards digital education for people with disabilities. The study reached the following results: the availability of digital learning skills among workers with disabilities. The study concluded with a series of recommendations including holding Training courses to keep up with the challenges of educational trends and modern technology in this area.

View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Monitoring the Land surface temperature LST with different seasons for Babylon City using GIS and R.S techniques
...Show More Authors
Abstract<p>This paper is based on the Sentinel-2 satellite data: the thermal, red, and NIR bands. The Babylon city was chosen in this study for different reasons: its location in the middle of Iraq and it represents the largest capitals of the Mesopotamia civilization in the word. The Land Surface Temperature (LST) was determined using a method that incorporates remote sensing, geographic information systems, and statistics. This process has made it possible to monitor the relationship between land usage and the land surface temperature for four seasons in the year 2021. The mapswere processed and analyzed by using ArcGIS software. Five maps of the LST were constructed. Each map represents diffe</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Iraqi Journal Of Oil And Gas Research (ijogr)
Comparative study of electrochemical oxidation system hybrid with photocatalytic system for the treatment of Al-Najaf petroleum refinery wastewater
...Show More Authors

View Publication
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology &amp; Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Jan 23 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The Influence of Different Fabrication Techniques and Preparation Designs on the Marginal Adaptation of Ceramic Veneers (An In vitro Comparative Study)
...Show More Authors

Background: Ceramic veneers represent the treatment of choice in minimally invasive esthetic dentistry; one of the critical factors in their long term success is marginal adaptation. The aim of the present study is to evaluate the marginal gap of ceramic veneers by using two different fabrication techniques and two different designs of preparation. Material and methods: A typodont maxillary central incisor used in the preparation from which metal dies were fabricated, which were in turn used to make forty stone dies. The dies divided into four experimental groups, each group had ten samples: A1: prepared with butt-joint incisal reduction and restored with IPS e.max CAD, A2: prepared with overlapped incisal reduction and restored with IPS e.

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 23 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Biomechanical evaluation of porous titanium implants (CpTi) fabricated by powder technology
...Show More Authors

Background: It may be an important prospective clinical use of manufacturing of porous implant for clinical situations, such as cases of limitation in bone height, low bone density .The small segment of porous implant an effective osseointegration allows increasing in contact area provided for small segmented porous provided by its surface configuration. This study was done to Fabricate porous titanium implants by powder technology, as well as the observation of removal torque values of porous titanium implants compared to smooth titanium implants. Materials and methods: Twenty porous titanium implants (3.2mm in diameter and 8mm in length) were manufactured by powder technology using commercially pure titanium powder of ≤75um part

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 23 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Postoperative assessment of dental implants by using multi-slice computed tomography
...Show More Authors

Background: Implantology is a fast growing area in dentistry. One of the most common issues encountered in dental implantation procedures is the lack of adequate preoperative planning. Conventional radiography may not be able to assess the true regional three-dimensional anatomical presentation. Multi Slice Computed Tomography provides data in 3-dimentional format offering information on craniofacial anatomy for diagnosis; this technology enables the virtual placement of implant in a 3-Dimensional model of the patient jaw (dental planning). Patients, Material and Methods: The sample consisted of (72) Iraqi patients indicated for dental implant (34 male and 38 female), age range between (20-70) years old. They were examined during a time p

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 27 2023
Journal Name
Applied Sciences
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an

... Show More
View Publication
Scopus (51)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Tue Feb 12 2019
Journal Name
International Journal Of Biosciences
Biomechanical and histological assessment of titanium dental implants coated with strontium substituted hydroxyapatite and fluorapatite mixture
...Show More Authors

Dental implants are considered a unique treatment alternative for the replacement of missing dentition. There is a strive for materials which increase bone formation in bone implant interface and improve osseointegration to offer immediate loading directly after placement with decreased time. The aim of the study was to assess the effect of nano strontium substituted hydroxyapatite and nano fluorapatite mixture coating of screw shaped commercially pure titanium at the bone implant interface by torque removal test and histological assessment in rabbit tibia. Commercially pure titanium was used to prepare 80 screws that were divided into machined surfaces (CpTi), coated with (SrHA), coated with (FA) and coated with mixture 50%SrHA + 50%FA (mi

... Show More
Preview PDF