Preferred Language
Articles
/
ZBeUwpEBVTCNdQwCnZqg
Detection of orthodontically induced inflammatory root resorption-associated biomarkers from the gingival crevicular fluid by proteomics analysis: a randomized-controlled clinical trial
...Show More Authors

Crossref
View Publication
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Application of Seed Mucilage Extracted from Lallemantia royleana as a Suspending Agent
...Show More Authors

The mucilage from the seeds of Lallemantia royleana family Labiatae was extracted and subjected to preformulation study for evaluation of its suitability for use as suspending agent. Furosemide suspensions were prepared using (1.5% w/v) of the extracted Lallemantia royleana mucilage, (1.5% w/v) chitosan and (0.35% w/v) xanthan gum. The mucilage was white in color and the average yield of dried mucilage obtained from L.royleana nutlets was 14 % w/w of the seeds used. It is sparingly soluble in water but swells in contact with it, giving a highly viscous solution. It is slightly acidic to neutral. It was found that the extracted natural mucilage of Lallemantia royleana exhibited a higher viscosity profil

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Applied Mathematical Modelling
Identification of a multi-dimensional space-dependent heat source from boundary data
...Show More Authors

View Publication
Scopus (17)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
Salt Distribution in a Soil Irrigated by Subsurface Emitter
...Show More Authors

The best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 30 2024
Journal Name
Iraqi Journal Of Science
A fourth Order Pseudoparabolic Inverse Problem to Identify the Time Dependent Potential Term from Extra Condition
...Show More Authors

     In this work, the pseudoparabolic problem of the fourth order is investigated to identify the time -dependent potential term under periodic conditions, namely, the integral condition and overdetermination condition. The existence and uniqueness of the solution to the inverse problem are provided. The proposed method involves discretizing the pseudoparabolic equation by using a finite difference scheme, and an iterative optimization algorithm to resolve the inverse problem which views as a nonlinear least-square minimization. The optimization algorithm aims to minimize the difference between the numerical computing solution and the measured data. Tikhonov’s regularization method is also applied to gain stable results. Two

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Male protagonists in Alice Walker's The Color Purple; a Voyage from Oppression to Maturity and Reconciliation
...Show More Authors

Alice Walker's novel The Color Purple1983, whose events take place in the rural Georgia and addresses the most important issues in the early 20thcentury; like male dominant society and women submission to men, weaves a mosaic picture of male-female relationships. Black men like Alphonso, Albert and Harpo are portrayed as oppressors, cruel and they exercise power and violence over their wives and daughters. Through the negative portrayal of black male characters, Walker is accused to be a men hating writer because she ''Views oppression as an essentially masculine activity which springs from the male's aggressive need to dominate. In the novel, man is the premium mobile, the one by whom and t

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 11 2024
Journal Name
F1000research
Unleashing the cardioprotective potential of Ezetimibe against Doxorubicin-induced cardiotoxicity in Wistar rats: Targeting oxidative stress and NF-κB-mediated inflammation
...Show More Authors

Background Doxorubicin (DOX) is a potent antineoplastic agent used in treating various adult and pediatric cancers, but it tends to provoke dose-dependent cardiotoxicity. Ezetimibe (EZE), a cholesterol-lowering drug, has been reported to possess defensive actions against oxidative stress and inflammation, which are two of the main proposed mechanisms underlying the development of DOX-induced cardiotoxicity (DIC), hence, we aimed to inspect the possible protective effect of EZE against DIC in rats. Methods 24 adult male Wistar rats were allocated into four groups of six: control, DOX, 10 mg/kg EZE plus DOX and 20 mg/kg EZE plus DOX. At the end of the study, the experimental rats were anesthetized and blood samples were collected for b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Clinics And Research In Hepatology And Gastroenterology
Genetic polymorphism of fibroblast growth factor receptor 2 and trinucleotide repeat-containing 9 influence the susceptibility to HCV-induced hepatocellular carcinoma
...Show More Authors

Background Fibroblast growth factor receptor 2 (FGFR2) and trinucleotide repeat-containing 9 (TNRC9) gene polymorphisms have been associated with some cancers. We aimed to assess the association of FGFR2 rs2981582 and TNRC9 rs12443621 polymorphisms with hepatocellular cancer risk. Methods One hundred patients with HCV-induced HCC, 100 patients with chronic HCV infection, and 100 controls were genotyped for FGFR2 rs2981582 and TNRC9 rs12443621 using allele-specific Real-Time PCR analysis. Results FGFR2 rs2981582 genotype TT was associated with increased risk of HCC when compared to controls (OR = 3.09, 95% CI = 1.24–7.68). However, it was significantly associated with a lower risk of HCC when using HCV patients as controls (OR =

... Show More
Scopus (5)
Scopus
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Concept And Importance Of Detection Failureś Possibilities Of Corporation Proposed Model For Application In The Iraqi Environment
...Show More Authors

Research aims to shed light on the concept of corporate failures , display and analysis the most distinctive models used to predicting corporate failure; with suggesting  a model to reveal the probabilities of corporate failures which including internal and external financial and non-financial indicators, A tested is made for the research objectivity and its indicators weight and by a  number of academics professionals experts, in addition to  financial analysts  and have concluded a set of conclusions ,  the most distinctive of them that failure is not considered a sudden phenomena for the company and its stakeholders , it is an Event passes through numerous stages; each have their symptoms that lead eve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Detection of early occlusal caries of the first permanent molar using different techniques (An in vivo study)
...Show More Authors

Background: Molars and premolars are considered as the most vulnerable teeth of caries attack, which is related to the morphology of their occlusal surfaces along with the difficulty of plaque removal. different methods were used for early caries detection that provide sensitive, accurate preoperative diagnosis of caries depths to establish adequate preventive measures and avoid premature tooth treatment by restoration. The aim of the present study was to evaluate the clinical sensitivity and specificity rates of DIAGNOdent and visual inspection as opposed to the ICDAS for the detection of initial occlusal caries in noncavitated first permanent molars. Materials and Methods: This study examined 139 occlusal surface of the first permanent

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref