Preferred Language
Articles
/
tRihV5UBVTCNdQwCVCx7
The Relation between Some Genetic Traits (Ptc Tasting, Tongue Rolling, Earlobe Attachment and Dental Occlusion in Iraqi Adults
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Study the Effect of Cyperus Rotundus Extracted as Mouthwash on the Corrosion of Dental Amalgam
...Show More Authors

Many extracted material were used as mouthwash to settle different kinds of oral fungi and bacteria. In this study an extractive of Cyperus rotundus plant E.C.R. which is very active as a mouthwash, was used in concentration range (10-25) ppm in artificial saliva at pH=6.4 and temperature range (288-318) K, to study it’s inhibitory effect on the corrosion of dental amalgam. Potentiostatic and cyclic polarization were used to follow this study. The presence of E.C.R. lead to shift the corrosion potential to the active direction and decreased the corrosion rate to about 98.87%, the inhibition action of E.C.R. resulting from the adsorption of C.R.E. layer between amalgam and saliva as FTIR spectrums shows, where the variety of FTIR adsorptio

... Show More
View Publication
Scopus (12)
Crossref (4)
Scopus Crossref
Publication Date
Sun Dec 28 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effects of unilateral premature loss of maxillary primary molars on the dental arch dimensions
...Show More Authors

Background: The aim of the study was to evaluate the amount of changes in the horizontal and vertical maxillary arch dimensions measurements following the premature loss of primary molars. Materials and methods: The sample consist of (50) children with unilateral prematurely extracted either first or second primary molars at the mixed dentition stage. Results and Conclusions: Results shows that there was an increase in the vertical incisor to canine distance (A) with both premature loss of first & second primary molars due to distal movement of primary canines and at the same time there were a significant loss of space in the extraction space with premature loss of second primary molar due to a mesial movement of maxillary first permanent

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Journal Of Craniofacial Surgery
The Effect of Bone Density Measured by Cone Beam Computed Tomography and Implant Dimensions on the Stability of Dental Implants
...Show More Authors

Abstract: The aim of this study was to evaluate the effect of bone density value in Hounsfield unit derived from cone beam computed tomography (CBCT), and implant dimensions in relation to implant stability parameters namely the resonance frequency analysis and the insertion torque (IT) value. It included 24 patients who received 42 dental implants (DI). The bone density of the planned implant site was preoperatively measured using cone beam computed tomography. The implant stability was measured using Osstell implant stability quotient (ISQ). The ISQ values were recorded immediately postoperatively and after 16 weeks. The IT value was categorized as 35 N/cm or > 35 N/cm. The mean (standard deviation) primary stability was 79.58 (5.27) ISQ,

... Show More
View Publication
Scopus (14)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of The College Of Basic Education
Solving Job-Shop Scheduling Problem Using Genetic Algorithm Approach
...Show More Authors

Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.             &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Petroleum Research And Studies
Optimizing Well Placement with Genetic Algorithms: A Case Study
...Show More Authors

Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty

... Show More
View Publication
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Automatic Approach for Word Sense Disambiguation Using Genetic Algorithms
...Show More Authors

Abstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (7)
Crossref (2)
Scopus Crossref