The aim of this study was to evaluate the effects of local application of bisphosphonate gel and recombinant human bone morphogenic protein 2 gel, on titanium dental implant stability and marginal bone level. Twenty-seven patients with upper and lower missing posterior tooth/teeth were included in the study with a total of 71 implants that were used for rehabilitation. The implants were randomly divided into 4 groups: 3 study groups and 1 control. Group1; local application of bisphosphonate gel, group 2; local application of recombinant human bone morphogenic protein 2 gel, group 3; local application of a mixed formula of both gels. The gel application was immediately preimplant insertion, group 4; implant insertion without application of any medication. Using resonance frequency analyzer, implant stability was measured 4 times; primary, 8 weeks (second stage surgery), 12 weeks, and at least 14 weeks post functional loading. The level of the marginal bone around each implant were assessed using cone beam computed tomography. Four implants failed. Generally, there was a similar pattern of changes in implant stability over the study period in all groups and the stability was dependent on the healing time with no significant difference between groups. There was no significant treatment effect regarding marginal bone level differences of study groups against control, although there were significant differences on palatal and mesiodistal surfaces among the study (test) groups.
The variation of compression index Cc and swelling index Cs with the degree of saturation S was studied on unsaturated and fully saturated soils for different degrees of saturation (100%, 91%, 85%, 75%, 60%), several mathematical equations were found to describe these relationships, these equations can be used to predict settlement during the consolidation process in unsaturated and fully saturated soils.
Background: The beneficial gut bacterium E. coli can cause blood poisoning, diarrhoea, and other gastrointestinal and systemic disorders. Objective: This study amid to examines the antibiofilm activity of Laurus nobilis leaves extract on E. coli isolates and compares pre- and post-treatment gene expression of fimA and papC genes. Subjects and Methods: Ten isolates of E. coli were obtained from the Genetic Engineering and Biotechnology Institute, University of Baghdad, which was previously collected from Baghdad city hospitals and diagnosed by chemical tests, the diagnosis was confirmed using VITEK-2 System. The preparation of the aqueous and methanolic Laurus nobilis leaves extracts was done by using the maceration method and Soxhlet appara
... Show MoreIsolation of fungi was performed from February to July, 2019. One hundred clinical specimens were collected from King Abdullah Hospital (KAH) Bisha, Saudi Arabia. Samples were collected from twenty patients of different ages (30 - 70 years old) ten males and ten females. The samples were collected from patients with the two types of diabetics. Specimens included blood, hair, nail, oral swabs and skin. Specimens were inoculated on Sabourauds Dextrose agar containing chloramphenicol. Thirteen fungal species were isolated and identified. The isolated species were: Aspergillus flavus, A. niger, A. terrus, A. nidulans, A. fumigatus, Candida albicans, C. krusei, C. parapsilosis, C. Tropicalis, Curvularia lunata, Fusarium solani, Penicill
... Show MoreThe aim of the research is to identify an appropriate training method that raises the levels of immune globulins (IgA, IgM, IgG) and white blood cells and the effect of training by (HIT) method using resistance (weights) as a training curriculum that increases immunity and ensures the continuation of the pills after the return of activity from the stone The response to the Covid-19 epidemic among amateur weightlifters, the researchers relied on the method of trace analysis in an experimental way by conducting a pre-, medial and post-test with the same experimental one agroup on a sample of amateur weightlifters in the Fury private hall for weightlifting and body building in Adhamiya, the number of sample members reached (15 players) who int
... Show MoreWe study in this paper the composition operator of induced by the function ?(z)=sz+t where , and We characterize the normal composition operator C? on Hardy space H2 and other related classes of operators. In addition to that we study the essential normality of C? and give some other partial results which are new to the best of our knowledge.
This paper investigates the interaction between fiscal and monetary policy in Iraq after 2003 using the prisoner’s dilemma.The paper aims to determine the best form of coordination between these policies to achieve their goals; payoff matrix for both policies was constructed. To achieve the purpose, the quantitative approach was applied using several methods, including regression, building payoff matrices and decision analysis using a number of software.The results of the monetary policy payment function show that inflation rate has an inverse relationship with the auctions of selling foreign currency and a positive relationship with the government’s activity, while the fiscal policy function shows that real growth is positively
... Show MoreThis article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More