When laser light incident on biological tissue, it is either reflected from the
surface of the tissue (e.g. the skin) or scattered inside the tissue or absorbed .The laser light will be
absorbed by water, hemoglobin and melanin. Absorption is also highly dependent on wave-length of
laser radiation. The absorbed light is converted into kinetic energy leading to laser effect that when
appropriately applied can produce reaction ranging from incision, vaporization to coagulation. Aim of
the study: To evaluate the efficiency of diode Laser 810 ± 20nm in treatment of oral lesions. Methods:
6 patients (2 females and 4 males) with different oral lesions were treated in the hospital of specialized
surgeries by the use of diode laser 810 nm, the lesions were: Apthous, Lichen planus, Pyogenic
granuloma, Second stage of implant. Results: The result of the study depended mainly on the c l i n i c al
observation during operation and in the follow up period. The results show that there was no pain, no
bleeding, and no infection while the edema and necrosis at the operation site are present. Conclusion:
Laser can be used to perform haemostatic surgery, decrease rate of infection and reduce post operative
discomfort.
Numerous blood biomarkers are altered in COVID-19 patients; however, no early biochemical markers are currently being used in clinical practice to predict COVID-19 severity. COVID-19, the most recent pandemic, is caused by the SRS-CoV-2 coronavirus. The study was aimed to identify patient groups with a high and low risk of developing COVID-19 using a cluster analysis of several biomarkers. 137 women with confirmed SARS CoV-2 RNA testing were collected and analyzed for biochemical profiles. Two-dimensional automated hierarchy clustering of all biomarkers was applied, and patients were sorted into classes. Biochemistry marker variations (Ferritin, lactate dehydrogenase LDH, D-dimer, and C- reactive protein CRP) have split COVID-19 patien
... Show MoreFor over a century, the global consumption of asphalt binder in asphalt mixture production has been substantial. In the Heet region (west of Iraq), two distinct forms of natural asphalt (NA) deposits exist: rock asphalt and sulfur spring asphalt. This study focused on using NA sourced from sulfur springs. The aim was to investigate the potential of incorporating NA into local asphalt mixtures. To achieve this, NA was heated to 163°C for varying durations. After heat treatment, laboratory tests were conducted on NA. The findings suggest that by heating NA for 20 hours, it conforms to Iraqi specifications in terms of physical properties. Furthermore, compared to conventional petroleum asphalt, treated NA showed greater
... Show MoreThe main aim of this research paper is investigating the effectiveness and validity of Meso-Scale Approach (MSA) as a modern technique for the modeling of plain concrete beams. Simply supported plain concrete beam was subjected to two-point loading to detect the response in flexural. Experimentally, a concrete mix was designed and prepared to produce three similar standard concrete prisms for flexural testing. The coarse aggregate used in this mix was crushed aggregate. Numerical Finite Element Analysis (FEA) was conducted on the same concrete beam using the meso-scale modeling. The numerical model was constructed to be a bi-phasic material consisting of cement mortar and coarse aggregate. The interface between the two c
... Show MoreIn this experimental study, the use of stone powder as a stabilizer to the clayey soil studied. Tests of Atterberg limits, compaction, fall cone (FCT), Laboratory vane shear (LVT), and expansion index (EI) were carried out on soil-stone powder mixtures with fixed ratios of stone powder (0%, 5%, 10%, 15%, and 20%) by the dry weight. Results indicated that the undrained shear strength obtained from FCT and LVT increased at all the admixture ratios, and the expansion index reduced with the increase of the stone powder.
Root-finding is an oldest classical problem, which is still an important research topic, due to its impact on computational algebra and geometry. In communications systems, when the impulse response of the channel is minimum phase the state of equalization algorithm is reduced and the spectral efficiency will improved. To make the channel impulse response minimum phase the prefilter which is called minimum phase filter is used, the adaptation of the minimum phase filter need root finding algorithm. In this paper, the VHDL implementation of the root finding algorithm introduced by Clark and Hau is introduced.
VHDL program is used in the work, to find the roots of two channels and make them minimum phase, the obtained output results are
An experimental and computational study is conducted to analyze the thermal performance of heat sinks and to pick up more profound information in this imperative field in the electronic cooling. One important approach to improve the heat transfer on the air-side of the heat exchanger is to adjust the fin geometry. Experiments are conducted to explore the impact of the changing of diverse operational and geometrical parameters on the heat sink thermal
performance. The working fluid used is air. Operational parameters includes: air Reynolds number (from 23597 to 3848.9) and heat flux (from 3954 to 38357 W/m
2 ). Conformational parameters includes: change the direction of air flow and the area of conduct
An experimental investigation has been carried out for zinc-nickel (Zn-Ni) electro-deposition using the constant applied current technique. Weight difference approach method was used to determine the cathode current efficiency and deposit thickness. Also, the influence effect of current density on the deposition process, solderability, and porosity of the plating layer in microelectronic applications were examined. The bath temperature effect on nickel composition and the form of the contract was studied using Scanning Electron Microscope (SEM). Moreover, elemental nature of the deposition was analyzed by Energy Dispersive X-Ray (EDX).
It has been found that the best bath temperature
... Show MoreThe genic variation analysis of Pseudomonas aeruginosa after filtering the spurious variation appeared that 222 variable loci out of 5572 loci were detected. The type of variation analysis revealed that single nucleotide polymorphism was highly significant compared with other types of variation due the fact that the genome variation was achieved on the level of microevolution. Moreover, the proportional effect of functional scheme showed that genes responsible for environmental information were the highest comparable to another scheme. The genes of environmental information processing locate on outer membrane and face the defense strategy of the host therefore change in proteins coded by these genes lead to escape the immune system defense
... Show MoreA3D geological model was constructed for Al-Sadi reservoir/ Halfaya Oil Field which is discovered in 1976 and located 35 km from Amara city, southern of Iraq towards the Iraqi/ Iranian borders.
Petrel 2014 was used to build the geological model. This model was created depending on the available information about the reservoir under study such as 2D seismic map, top and bottom of wells, geological data & well log analysis (CPI). However, the reservoir was sub-divided into 132x117x80 grid cells in the X, Y&Z directions respectively, in order to well represent the entire Al-Sadi reservoir.
Well log interpretation (CPI) and core data for the existing 6 wells were the basis of the petrophysical model (
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show More