Many therapeutic methods used to encourage reparative processes of cartilage and accelerate their healing such as drugs, magneto-laser and so on. Twenty four adult New Zealand rabbits used in this study. They were divided in to two groups; control and treaded with He –Ne laser. A square skin flap done on the medial aspect of both auricles followed by pealing a square piece of cartilage from the auricle then the flaps sutured .The site of the operation in the rabbits of the treated group were irradiated with He –Ne laser 5mw power for seven days began after the operation directly. 3 rabbits from each group used for collection of specimens for histopathological examination at the 1, 2, 4 & 6 weeks post the operation. Significantly well developed cartilage growth, chondroblasts and chondrocytes invade the area of the operation .High increase in the thickness of connective tissue in the same area contain mainly collagen fibers and lesser amount of elastic fibers. He –Ne laser irradiation raised the mitotic activity of the cartilage cells, activated the reproduction processes in addition to the intra and extra regenerative repair
In this work, the dyes Rhodamine B and Coumarin 102 containing titanium dioxide nanoparticles were used as scattering centers to fabricate a random gain medium. The laser dye was dissolved in hexanol and methanol solvent respectively. The titanium dioxide nanoparticles were synthesized by DC reaction magnetron spraying technique. The random-gain medium was made by adding 2.5 mg of titanium dioxide nanoparticles to Rhodamine and coumarin 102 dyes by coating the glass cell with two-sided titanium dioxide with high spectral efficiency and low production cost. A narrow line optical emission was detected at 565 nm for Rhodamine B and 534 nm for coumarin 102, where it was found that rhodamine B dye has FWHM 8 nm and coumarin dye 102 has FWHM 9 nm
... Show MoreAim: The Aim of the study is to compare between Er,Cr:YSGG 2780 nm laser and carbide fissure bur in root-end resection regarding the morphological variations, temperature changes and the duration of resection process.
Settings and Design: 5 W, 25 Hz, 50% water, 80% air,25.47 J/cm2 .
Material and method: twenty-one extracted single rooted teeth endodontically were treated, twenty teeth were obturated and divided into two groups according to method of resection. Group 1 root-end resected using cross cut carbide bur while group 2 root-end resected using laser with MGG6 sapphire tip of 600 μm diameter. Temperature on external root surface and duration of resection were recor
... Show MoreThis paper develops a nonlinear transient three-dimensional heat transfer finite element model and a rate independent three-dimensional deformation model, developed for the CO2 laser welding simulations in Al-6061-T6 alloy. Simulations are performed using an indirect coupled thermal-structural method for the process of welding. Temperature-dependent thermal properties of Al-6061-T6, effect of latent heat of fusion, and the convective and radiative boundary conditions are included in the model. The heat input to the model is assumed to be a Gaussian heat source. The finite element code ANSYS12, along with a few FORTRAN subroutines, are employed to obtain the numerical results. The benefit of the proposed methodology is that it
... Show MoreAims: This study was done to investigate the effect of low energy laser therapy on bone healing at the extraction site. Materials and methods:(24) male albino rats were exposed to the extraction procedure of the maxillary first molar on the first day of a seven day experiment and these animals were divided into two main groups; the control group and the laser group. The laser experiment involved using (Ga-As infrared diode laser) from optodent by directing the probe over the extraction site. The control group consisted of 4 rats, and the laser group was subdivided into 5 subgroups of 4 rats each. The laser dose was as follows: B1: a single dose of 5 minutes immediately after extraction.,
... Show MoreWe observed strong nonlinear absorption in the CdS nanoparticles of dimension in the range 50-100 nm when irradiant with femtosecond pulsed laser at 800 nm and 120 GW/cm 2 irradiance intensity. The repetition rate and average power were 250 kHz and
We have studied the effect of applying an external magnetic field on the characteristics of iron oxide (IO) nanoparticles (NPs) synthesized by pulsed laser ablation in dimethylformamide (DMF). The NPs synthesized with and without applying of magnetic field were characterized by Fourier transformation infrared spectroscopy (FT-IR), UV–Vis absorption, scanning electron microscope (SEM), atomic force microscope (AFM), and X-ray diffraction (XRD). SEM results confirmed that the particle size was decreased after applying magnetic field.
In this study, silver-tungsten oxide core–shell nanoparticles (Ag–WO3 NPs) were synthesized by pulsed laser ablation in liquid employing a (1.06 µm) Q-switched Nd:YAG laser, at different Ag colloidal concentration environment (different core concentration). The produced Ag–WO3 core–shell NPs were subjected to characterization using UV–visible spectrophotometry, X-ray diffraction (XRD), transmission electron microscopy (TEM), energy-dispersive spectroscopy, electrical analysis, and photoluminescence PL. The UV–visible spectra exhibited distinct absorption peaks at around 200 and 405 nm, which attributed to the occurrence of surface Plasmon reson
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More
