Aims: This study was done to investigate the effect of low energy laser therapy on bone healing at the extraction site. Materials and methods:(24) male albino rats were exposed to the extraction procedure of the maxillary first molar on the first day of a seven day experiment and these animals were divided into two main groups; the control group and the laser group. The laser experiment involved using (Ga-As infrared diode laser) from optodent by directing the probe over the extraction site. The control group consisted of 4 rats, and the laser group was subdivided into 5 subgroups of 4 rats each. The laser dose was as follows: B1: a single dose of 5 minutes immediately after extraction.,
... Show MoreThe research aims to study the effect of adding (Li2O) to an alkaline glaze containing (K2O, Na2O). Although all the alkaline oxides have common properties, each oxide has something that distinguishes it. The molecular weight of (Li2O) is two times less than that of (Na2O) and three times that of (K2O). Therefore, it is added in small proportions. In addition, it is a very strong flux, so it is not used alone, but rather replaces a part of other alkaline oxides. It was added to an alkali glass that matured at a temperature of 980CO in proportions (2.0,1.4,1.2,0.8,0.4%) instead of (Na2O), using lithium carbonate (Li2CO3) as an oxide source. The glazes mixtures were applied to a white pottery body, and the samples were fired and cooled acc
... Show MoreBackground: Low-level laser therapy (LLLT) has been extensively applied to improve wound healing due to some biostimulatory properties presented by laser arrays apparently able to accelerate the repair of soft tissue injuries. However, the role of proinflammatory interlukines not been studied yet. IL_1 ? represent one of the most important poroinflammatory interlukines that involved in wound healing. The goal of this study was to investigate the effect of 790-805nm diode laser on the expression of IL_1 ? during wound healing in mice. Materials and Methods: Standard-sized wounds (1.5cm) were carried out in the face of 96 white albino mice. Half of them underwent LLLT treatment (360 J/cm 2) at 790-805 nm delivered immediately after wound pro
... Show MoreThe study aimed to identify the reality of the application of cost accounting system in the contracting institutions in Saudi Arabia, and the extent of the reflection of the application of this system on the effectiveness and efficiency of the general performance of these institutions. Where the research community consists of the contracting institutions operating in the Saudi Arabia, and then a suitable random sample was selected from seventy one institutions. The researchers used the historical method to track the previous studies as well as the descriptive approach to conducting the field study. The study data were analyzed by SPSS statistical program.
The results of this study conclude that there is a
... Show MoreA total of 589 fishes, belonging to 23 species were collected from eight different localities
in north and mid Iraq during 1993. The parasitological inspection of such fishes revealed the
presence of 59 parasite species and two fungi. Among such parasites, five monogenetic
trematodes were recorded on the gills of some fishes for the first time in Iraq. These
included:- Ancyrocephalus vanbenedenii on Liza abu from Tigris river at Al-Zaafaraniya,
south of Baghdad; Dactylogyrus anchoratus on Cyprinus carpio from Tigris river at Al –
Zaafaranya D. minutus on C. carpio from both Tigris river at Al-Zaafaraniya and Euphrates
river at Al-Qadisiya dam lake; Discocotyle sagittata on L. abu from both the drainage system
at
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show Morein this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
Background: To elucidate the possible role of human cytomegalovirus in pregnancy loss through induction of certain pro-inflammatory adhesion molecules.
Methods: Paraffin embedded sections of curate samples were obtained from 34 women had spontaneous abortion, and 5 women had elective termination of pregnancy (as control), and then subjected for immunohistochemistry analysis to detect human cytomegalovirus (HCMV) early protein and VCAM-1 molecule.
Results: Nine out of 34 women with spontaneous abortion were positive for HCMV early protein, with a
significantly higher expression of VCAM-1 in HCMV positive cases as compared with HCMV negative and the control groups (p = 0.05, 0.001 respectively).
Conclusion: HCMV infection may p
The problem of poverty and deprivation constitute a humanitarian tragedy and its continuation may threaten the political achievements reached by the State. Iraq, in particular, and although he is one of the very rich countries due to availability of huge economic wealth, poverty indicators are still high. In addition, the main factor in the decline in the standard of living due to the weakness of the government's performance in the delivery of public services of water, electricity and sanitation. Thus, the guide for human development has been addressed which express the achievements that the state can be achieved both on a physical level or on the human level, so in order to put appropriate strategies and policies aimed at elimin
... Show More