Preferred Language
Articles
/
ShaxdIcBVTCNdQwC70yt
Evaluation for the Cytotoxic Effect of Exotoxin A Produced by Pseudomonas aeruginosa on Mice by using Cytogenetic Parameters
...Show More Authors

This research was conduct to evaluate the cytotoxic effect of exotoxin A (ETA) produced by Pseudomonas aeruginosa on mice in comparison with (phosphate buffer saline (PBS) as a negative control. The effect of the toxin was measured by employing the cytogenetic analysis which included (the mitotic index (MI), chromosomal aberrations (CAs), micronucleus (MN) and sperm abnormalities) parameters. In order to specify the cytotoxic effect of the toxin, three doses of ETA (125, 250 and 500 ng/ml) were used. Results showed that ETA was found to cause a significant decrease in mitotic index (MI) percentage, while significant increase in micronucleus (MN), chromosomal aberrations (CAs) and sperm abnormalities parameters in compression with control was noticed. These differences were found to be dose degraded

Publication Date
Wed Jan 29 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of frictional forces generated by different brackets and orthodontic wires
...Show More Authors

Background: Sliding mechanics is widely used during orthodontic treatment. One of the disadvantages of this mechanics is the friction generated at the bracket/archwire interface, which may reduce the amount of desired orthodontic movement obtained. The aim of the present in vitro study was to evaluate and compare the static frictional forces produced by two passive self-ligating brackets stainless-steel and hybrid and two conventional brackets stainless-steel and monocrystal ligated with stainless-steel ligature wire at two degrees of torque(zero and twenty) under dry condition. Materials and method: One hundred and sixty brackets were used in this study divided into four groups each group consisted of forty brackets these are: Two self-li

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 30 2008
Journal Name
Al-kindy College Medical Journal
Evaluation of Patients with Liver Injuries Treated by Perihepatic Gauze Packing
...Show More Authors

Background: The liver is one of the most common organs
injured after blunt abdominal trauma. The control of severe
hemorrhage remains a problem.
Methods: One-hundred thirty-eight patients diagnosed as
liver injury between 09/2003 and 08/2006 had been evaluated
prospectively in Al- Kindy Teaching Hospital.
A distinction was made between hemodynamically stable and
unstable patients. Different modalities of surgical procedures
were done concentrating on perihepatic gauze packing.
Results: (60 out of 138) patients included in the study were
clinically evaluated as hemodynamically stable. The average
abbreviated injury severity score (ISS) was 25. Twenty
patients underwent abdominal surgery. In 12 of them

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 29 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Biomechanical evaluation of porous titanium implants (CpTi) fabricated by powder technology
...Show More Authors

Background: It may be an important prospective clinical use of manufacturing of porous implant for clinical situations, such as cases of limitation in bone height, low bone density .The small segment of porous implant an effective osseointegration allows increasing in contact area provided for small segmented porous provided by its surface configuration. This study was done to Fabricate porous titanium implants by powder technology, as well as the observation of removal torque values of porous titanium implants compared to smooth titanium implants. Materials and methods: Twenty porous titanium implants (3.2mm in diameter and 8mm in length) were manufactured by powder technology using commercially pure titanium powder of ≤75um part

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 29 2025
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
Suggested method of Estimation for the Two Parameters of Weibull Distribution Using Simulation Technique
...Show More Authors

In this paper, suggested method as well as the conventional methods (probability
plot-(p.p.) for estimations of the two-parameters (shape and scale) of the Weibull
distribution had proposed and the estimators had been implemented for different
sample sizes small, medium, and large of size 20, 50, and 100 respectively by
simulation technique. The comparisons were carried out between different methods
and sample sizes. It was observed from the results that suggested method which
were performed for the first time (as far as we know), by using MSE indicator, the
comparisons between the studied and suggested methods can be summarized
through extremely asymptotic for indicator (MSE) results by generating random
error

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
Approximate Solution for advection dispersion equation of time Fractional order by using the Chebyshev wavelets-Galerkin Method
...Show More Authors

The aim of this paper is adopted to give an approximate solution for advection dispersion equation of time fractional order derivative by using the Chebyshev wavelets-Galerkin Method . The Chebyshev wavelet and Galerkin method properties are presented. This technique is used to convert the problem into the solution of linear algebraic equations. The fractional derivatives are described based on the Caputo sense. Illustrative examples are included to demonstrate the validity and applicability of the proposed technique.

View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG
...Show More Authors

One of the primary problems in internet is security, mostly when computer utilization is increasing in all social and business areas. So, the secret communications through public and private channels are the major goal of researchers. Information hiding is one of methods to obtain a security communication medium and protecting the data during transmission.
This research offers in a new method using two levels to hide, the first level is hiding by embedding and addition but the second level is hiding by injection. The first level embeds a secret message in one bit in the LSB in the FFT and the addition of one kashida. Subtraction of two random images (STRI) is RNG to find positions for hiding within the text. The second level is the in

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
On Light Mapping and Certain Concepts by Using m_X N-Open Sets
...Show More Authors

The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref