Preferred Language
Articles
/
aBYGTocBVTCNdQwCCENP
The Effects of Local Alendronate With or Without Recombinant Human Bone Morphogenetic Protein 2 on Dental Implant Stability and Marginal Bone Level: A Randomized Controlled Study
...Show More Authors

The aim of this study was to evaluate the effects of local application of bisphosphonate gel and recombinant human bone morphogenic protein 2 gel, on titanium dental implant stability and marginal bone level. Twenty-seven patients with upper and lower missing posterior tooth/teeth were included in the study with a total of 71 implants that were used for rehabilitation. The implants were randomly divided into 4 groups: 3 study groups and 1 control. Group1; local application of bisphosphonate gel, group 2; local application of recombinant human bone morphogenic protein 2 gel, group 3; local application of a mixed formula of both gels. The gel application was immediately preimplant insertion, group 4; implant insertion without application of any medication. Using resonance frequency analyzer, implant stability was measured 4 times; primary, 8 weeks (second stage surgery), 12 weeks, and at least 14 weeks post functional loading. The level of the marginal bone around each implant were assessed using cone beam computed tomography. Four implants failed. Generally, there was a similar pattern of changes in implant stability over the study period in all groups and the stability was dependent on the healing time with no significant difference between groups. There was no significant treatment effect regarding marginal bone level differences of study groups against control, although there were significant differences on palatal and mesiodistal surfaces among the study (test) groups.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization and Preliminary Study of the Anti-Inflammatory Activity of New Pyrazoline Containing Ibuprofen Derivatives
...Show More Authors

View Publication Preview PDF
Scopus (15)
Crossref (5)
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Study the Quality of Nasopharyngeal plans Using Evaluation Indexes of IMRT and VMAT Treatment planning Techniques
...Show More Authors

Radiation treatment has long been the conventional approach for treating nasopharyngeal cancer (NPC) tumors due to its anatomic features, biological characteristics, and radiosensitivity. The most common treatment for nasopharyngeal carcinoma is radiotherapy. This study aimed to assess the better quality of radiotherapy treatment techniques using intensity-modulated radiotherapy (IMRT) and volumetric-modulated arc therapy (VMAT). The VMAT and IMRT are comparative techniques. Forty patients with nasopharyngeal carcinoma and forwarded for radiotherapy were treated with both advanced techniques, IMRT and VMAT, using eclipse software from Varian. The x-ray energy was set at 6 MV. The total prescribed dose was 70 Gy. The results show that the

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Sabrao Journal Of Breeding And Genetics
MORPHOLOGICAL AND ANATOMICAL STUDY OF THE FLORAL PARTS OF LILY (LILIUM CANDIDUM L.) CULTIVATED IN IRAQ
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Comparative Study for Risk Criteria of Al-Qudus Plant between the Present and Planning of MOE
...Show More Authors

The main function of a power system is to supply the customer load demands as economically as possible. Risk criterion is the probability of not meeting the load. This paper presents a methodology to assess probabilistic risk criteria of Al-Qudus plant before and after expansion; as this plant consists of ten generating units presently and the Ministry Of Electricity (MOE) is intending to compact four units to it in order to improve the performance of Iraqi power system especially at Baghdad region. The assessment is calculated by a program using Matlab programming language; version 7.6. Results show that the planned risk is (0.003095) that is (35 times) less than that in the present plant risk; (0.1091); which represents respectable imp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 06 2020
Journal Name
كلية التربية البدنية وعلوم الرياضة/جامعة بغداد
Disability Scale and Its Relationship With Cognitive Behavior On Some Basic Skills, Offensive Tactical Performance In Youth Soccer Players
...Show More Authors

MO Khudhair, 2020

View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (7)
Crossref