Preferred Language
Articles
/
-RaaQogBVTCNdQwCIHVT
Biofunctionalization of polyetheretherketone implant material by bone-forming peptide-2 immobilization
...Show More Authors

Polyetheretherketone (PEEK) has favorable biomechanical properties to be used as an implant material. Unfortunately, it is hydrophobic and does not promote cellular adhesion, which could result in poor integration with bone tissue. Bio-functionalization of PEEK surface with osteogenic peptides derived from bone extracellular matrix proteins is an exciting approach to encourage bone formation around the implant. In the current study, bone-forming peptide-2 was immobilized on PEEK surface using two different methods, using dopamine and a diglycidyl ether as conjugate compounds, respectively. Peptide quantification test revealed that the two strategies resulted in the most amount of peptides were attached with 0.5 mM concentration and no further peptides were grafted with a higher peptide concentration. Both methods showed good peptide stability after agitation in aqueous solution. Peptide grafting was confirmed with ATR-FTIR. Surface characterizations with AFM and wettability tests resulted in a significant increase in surface roughness and surface area ratio for the peptide-grafted PEEK compared to unmodified PEEK, which led to a signifi-cant enhancement in the wettability of the modified PEEK surface

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Ecological Engineering
Cadmium Removal from Contaminated Soil by Electro-Kinetic Method
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Online Journal Of Veterinary Research
Article review: Infections by gram + bacteria in laboratory mice
...Show More Authors

Publication Date
Sun Dec 01 2013
Journal Name
Al- Mustansiriyah Journal Science
Convex Approximation by q- Meyer-König-Zeller Durrmeyer Operators
...Show More Authors

Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Human recognition by utilizing voice recognition and visual recognition
...Show More Authors

Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Plasmid role in agar utilization by Pseudomonas sp. HK1
...Show More Authors

Forty different samples (water and soil) were collected from different places in Iraq and Syria. Only (6) isolates showed the ability to grow and utilize agar as a sole source of carbon and energy. Morphological, cultural characterization and biochemical tests confirmed that These isolates belonging to genus Pseudomonas (HK1-HK6) .Plasmid profiles results showed that these isolates were harbored (2 -3) small Plasmids . HK1 isolate was selected because of its efficiency and ability to grow in high density on agar media for transformation and curing experiments, these were checked by transformation experiments after their expression in E. coli MM294. The genes responsible for agar utilization were located on thes

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
Synthesized copper nanoparticles by sonoelectrodeposition for gas filter applications
...Show More Authors

Copper nanoparticles (CuNPs) were prepared with different diameters by sonoelectrodeposition technique using Electrodeposition process coupled with high-power ultrasound horn (Sonoelectrodeposition). The particle diameter of the CuNPs was adjusted by varying CuSO4 solution acidity (pH) and current density. The morphology and structure of the CuNPs were examined by X-ray diffraction (XRD) and Scanning Electron Microscopy (SEM). It was found that the size of the produced copper nanoparticles ranged between 22 to 77 nm, where the diameter of CuNPs increases with reduction the solution acidity from 0.5 to 1.5 pH and increasing the current density of the deposition from 100 to 400 nm. Finally the produced CuNPs were pressed to fabricate disc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Current Science
Histopathological changes in golden hamsters induced by Leishmania tropica
...Show More Authors

.

Preview PDF