Preferred Language
Articles
/
bijps-884
Use of Human Umbilical Cord Serum to Treat Animal Skin Burns
...Show More Authors

Objective: The objective of the study was to test the hypothesis, that umbilical cord blood crude serum applied topically with its high concentration of growth factors may promote an early healing for animal models with burn injury.

Methods:  Fresh human umbilical cord blood UCBS was collected and screened for transmitted diseases such as hepatitis B, hepatitis C and HIV. Mice and rabbits were scalded by boiling water and chemical burning by NaOH, then treated with UCBS. In comparison with a Cetrimide treated group and a control group (without treatment). The UCBS was subjected to microbial testing to demonstrate the presence or absence of extraneous viable contaminating microorganisms.

Results: Topical application of UCBS promoted the healing process; complete healing was seen after 10 days for the mice group and in 7 days in the rabbit group. Cetrimide group applied to the rabbit showed slow healing and needed 10 days for hair regrowth. Control group in both mice and rabbits showed very slow response and the burn area diameter remained the same for over 10 days, and no hair regrowth was obvious after 10 days.   

Conclusion: The results of the current study indicated that UCBS is a promising therapy for the healing of burns by boiling water and/or chemical substance, more clinical trials are needed to further explore the long-term effects after UCBS use.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Tue Jun 21 2022
Journal Name
Azerbaijan Medical Journal
Factors contributed to dehiscent uterine scar in women with previous one cesarean section
...Show More Authors

Preview PDF
Publication Date
Thu May 02 2024
Journal Name
Petroleum And Coal
Wellbore Instability Analysis to Determine the Failure Criteria for Deep Well/H Oilfield
...Show More Authors

View Publication
Scopus (2)
Scopus
Publication Date
Wed Jan 01 2025
Journal Name
World Neurosurgery
The Ventriculoperitoneal Shunt Complication Rate in Baghdad Medical City from 2019 to 2022
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Nodes In Transport Networks – Research, Data Analysis And Modelling
Suggested Solutions to Reduce Traffic Congestion During Rush Hours in Al-Jadriya Intersection
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Maximum bite force in relation to maximum mouth opening among primary school children
...Show More Authors

Background: The vertical distance between the upper and lower incisal edge of the central incisors when the mouth is opened as wide as possible is called maximum mouth opening (MMO). Any pathological change in the masticatory system had a direct effect on the maximal mouth opening. The aim of this study was to evaluate the relationship between the maximum bite force and the maximum mouth opening among group of children. Materials and methods: Four hundred children of both genders were included in this study, their age ranged from eight to ten years. Anterior and posterior (right, left) bite force were measured using bite force sensor. Maximum mouth opening was evaluated by electronic digital caliper. Data was statistically analyzed

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
The Authoritarian Character and Its Relation to Setting Location For High School Students
...Show More Authors

The current search aims to identify First: To measure the level of authoritarian personality among the students of the sample as a whole. Second: Measurement of differences in the level of authoritarian personality among students in the middle school according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Third: the level of control site level among the students of the sample as a whole. Ra'aa: Measurement of differences in the level of the control site among junior students according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Fifth: Explain the relationship between the authoritarian personality and the locus of control among the students of the research sample.

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing the comprehensive electronic banking system to detect operational business risks (applied research)
...Show More Authors

Abstract:

                In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 01 2008
Journal Name
2008 International Symposium On Information Technology
Algebraic strategy to generate pairwise test set for prime number parameters and variables
...Show More Authors

View Publication
Scopus (21)
Crossref (17)
Scopus Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Geopolitical dimensions to build a dam on the downstream Renaissance (Egypt and Sudan)
...Show More Authors

Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r

... Show More
View Publication Preview PDF