Preferred Language
Articles
/
zxb_rYoBVTCNdQwC8KLJ
New Techniques to Enhance Data Deduplication using Content based-TTTD Chunking Algorithm
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Mar 28 2023
Journal Name
International Journal Of Dentistry
The Effect of Different Obturation Techniques in Primary Teeth on the Apical Microleakage using Endoflas: A Comparative In Vitro Study
...Show More Authors

Objectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2019
Journal Name
Journal Of Engineering
Evaluation of Heavy Metals Content in Simulated Solid Waste Food Compost
...Show More Authors

Composting is one of the solid waste management (SWM) methods where the organic component decomposed biologically under controlled conditions. In this study, a 0.166 m3 bioreactor tank was designed to compose 59.2Kg of simulated common municipal solid food waste having a bulk density, organic matter, organic carbon, pH, nitrogen content, C/N and nitrification index (NH4-N/ NO3-N) of 536.62 kg/m3, 62.34%, 34.76%, 6.53, 1.86%, 23 and 0.34 respectively. The bioreactor operated aerobically for 30 days, and anaerobically for 70 days, until the end of the composting process. Results proved that the composting process could reduce the mass of the waste by 69%.  Nitrogen content,

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Iraqi Journal Of Agricultural Sciences
Effect of silicon, calcium and boron on apple leaf minerals content
...Show More Authors

Scopus (13)
Scopus
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
content Analysis for Some Type of Pillows used in Iraqi houses
...Show More Authors

content Analysis for Some Type of Pillows used in Iraqi houses

View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
2019 Ieee Asia-pacific Conference On Computer Science And Data Engineering (csde)
Effect of Clay Content on Performance of a Crushed Rock Mix
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Heliyon
Inter-personal versus content: assessment of communication skills in Iraqi physicians
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
The speech communication btween the shape and content in commercial advertising
...Show More Authors

The Main think that be kept by the speech communication as a concept traditionally being expressed on the subject or a certain idea of ​​a goal came on as needed functional addressed to recipients of benefits or likely to benefit from those rhetorical message through a speech importance and priority of the effect of not less than the effect of that letter, in science content role ends once you absorb it mentally, either in the art of design Valamadmon intellectual embodied through its interaction with the overall shape of the finished design, and often content is associated in the mind of the receiver through a letter communicative linked to the sense or the goal that meant the designer, and try to identify and explain. And meaning i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref