A first-principles study of the electronic, structural, and optical properties of CrN and Mo:CrN clusters
...Show More Authors
Background: Visfatin is a novel adipokine that mainly secreted by visceral adipose tissue, had an important role in inflammation and immune system. Creatine Kinase (CK) which is an enzyme that is involved in energy metabolism, found in large amounts in myocardium, brain and skeletal tissues. This study is carried out To evaluate the periodontal health status of the study groups (chronic periodontitis and chronic periodontitis with coronary atherosclerosis) and control groups, to measure the salivary levels of visfatin and Creatine Kinase in these groups and compare between them, and to determine the correlations between salivary visfatin and Creatine Kinase levels with the periodontal parameters in the three groups. Materials and Methods: e
... Show MoreThe liability limit liability limit and reinsurance re factors insurance are important in influencing the achievement of company's competitive goals and achieve success and excellence in the market and because the limit of liability and reinsurance aimed to increase output with the stability of inputs leading to increased insurance business and increase profits. The study was based on two variables presidents interact with each other to form the intellectual and philosophical framework has two ( the limit of liability and reinsurance ) . The study was launched from a problem expressed by a number of targeted questions answered from the elucidation of theoretical philosophy and intellectual goals of these variables and highlight the impor
... Show MoreThe study aimed to investigate the effect of different times as follows 0.5, 1.00, 2.00 and 3.00 hrs, type of solvent (acetone, methanol and ethanol) and temperature (~ 25 and 50)ºc on curcumin percentage yield from turmeric rhizomes. The results showed significant differences (p? 0.05) in all variables. The curcumin content which were determined spectrophotometrically ranged between (0.55-2.90) %. The maximum yield was obtained when temperature, time and solvent were 50ºC, 3 hrs and acetone, respectively.
While conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).
Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this
An essential issue in obstetrics is the prevalence of maternal and fetal complications in pregnant women with polycystic ovary syndrome (PCOS). The purpose of the present study was to investigate the prevalence of pregnancy complications among various phenotypes of pregnant women with PCOS.
Background: Oncogenesis in the oral cavity is widely believed to result from cumulative genetic alterations that cause a transformation of the mucosa from normal to dysplastic to invasive carcinoma. The p16 gene produces p16 protein, which in turn inhibits phosphorylation of retinoblastoma (Rb), p16 play a significant role in early carcinogenesis. A number of epidermal growth factor receptor (EGFR) family, HER2/neu, has received much attention because of its therapeutic implications. The aims of the study were to evaluate and compare the immunohistochemical expression of the cell cycle protein P16 INK4a and c-erbB2 (HER2/neu) in NOM, OED, and OSCC. Correlate both marker expression with each other as well as with various clinicopathological
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreBackground: Pulpotomy is an accepted treatment for the management of cariously exposed pulps in symptom free primary molars to achieve one of the most important goals for Pedodontists, which is the retention of the pulpally involved deciduous teeth healthy until the time of normal exfoliation. The purpose of this study was to evaluate the relative success of pulpotec, formocresol and Mineral Trioxide Aggregate (MTA) in cariously exposed primary molar teeth, using clinical and radiographical examinations. Materials and methods: Thirty nine children with 45 primary molars requiring pulpotomy were selected in this study, 15 teeth treated by each type of pulpotomy medicament. Clinical and radiographical follow up for the patients was performed
... Show More