Background: The type of dental implant surface is one of many factors that determine the success of implant restoration. This study aimed to study the effect of mixture of nano titanium oxide with nanohydroxyapatite coating of screw shaped CPTi dental implant on bond strength at bone implant interface by torque removal test related to two healing periods (2 and 6 weeks). Materials and methods: Dip coating process was performed to get an even coating layer on CPTi screws. X-ray diffraction (XRD) analysis and microscopical examination were performed on the coating surfaces of the CPTi. The tibia of 10 white New Zealand rabbits was chosen as implantation sites. The tibia of each rabbit received two screws, one was coated with mixture of nanoTio2and nanoHA and the other was coated with nanoHA and a total of 40 screws were implanted. Torque removal test was performed to measure bond strength between implant and bone, after 2 and 6 weeks healing periods. . Results: The results revealed, that the mean removal torque recordings for the mixture of nanoTio2and nanoHA coated screws was significantly greatly than the nanoHA covered screws over the two periods of time(2and6 weeks). There was an increase in the torque value with time. Conclusion: Commercially pure titanium implant coated with mixture of nanoTio2andnanoHApresented an increasing bond strength at bone implant interface than nanoHA , after 2 and 6 weeks (20.13±4.4 N.cm , 26.47±4 N.cm. ) in comparison to nanoHA coating after 2 and 6 weeks (15.16±2.5 N.cm , 20.12±2.3 N.cm) .
Many international studies indicated that the polymorphisms of some genes disturbed the folate homocysteine (Hcy) metabolism and increased the vulnerability to Down syndrome (DS). We aimed to measure the serum levels of folate and Hcy in DS children and compare the levels with age and sex-matched apparently normal healthy children. We also aimed to study the A80G polymorphism of the gene reduced folate carrier (RFC1) in the DS children as a risk factor. Forty children with DS (24 were boys, and 16 were girls) with the age range between 5-13 years, and 26 normal healthy children (16 boys and ten girls) were included in this study. The results show that the highest genotype in the control group was AG (53.85%) followed by AA and GG (30.
... Show MoreIntroduction:
Many business owners suffer major financial problems during periods of financial stagnation, the decline of markets and businesses, or under the impact of financial shocks for certain reasons that result in large debts and the consequent financial and legal obligations. This is the beginning of a long and endless path of suffering and the search for a safe exit. It is even worse for financial institutions to facilitate financial solutions that rely on lending as a solution to their financial problem. Debt and its consequences increase, and the problem deepens and becomes complicated until things become entangled and the escape or declaration of bank
... Show MoreObjectives: To study the spectrum and classification of ATP7B variants in Iraqi children with Wilson disease by direct gene sequencing with clinical correlation. Methods: Fifty-five unrelated children with a clinical diagnosis of Wilson disease (WD) were recruited. Deoxyribonucleic acid was extracted from peripheral blood samples, and variants in the ATP7B gene were identified using next-generation sequencing. Results: Seventy-six deleterious variants were detected in 97 out of 110 alleles of the ATP7B gene. Thirty (54.5%) patients had 2 disease-causing variants (15 homozygous and 15 compound heterozygous). Twelve (21.8%) patients had one disease-causing variant and one variant of uncertain significance (VUS) with potential pathogenicity. T
... Show MoreThe present study aims to identify the role of behavioral disorders (anxiety disorder, behavior disorder "behavior", confrontation and challenge disorder, aggressive behavior) in predicting bullying patterns (verbal, physical, electronic, school) in a sample of adolescents with autism spectrum disorder. For this purpose, the researcher developed scales to measure the behavioral disorders and the bullying patterns among adolescents with autism spectrum disorder. The researcher adopted the descriptive survey approach. The study sample consists of (80) adolescents with autism spectrum disorder with ages range from (15-19 years) and (45-53 years old) in association with israr association for people with special needs in the northern borders
... Show MoreThe study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In order to achieve these goals, the researcher relies on the descriptive approach in addition to the questionnaire and interviews to collect data. It ends with a number of results such as: The study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In ord
... Show MoreThe current research includes several axes, which determine the basic professional skills among kindergarten teachers and government civil Balraudhat and their relationship to educate kindergarten children with life skills teacher Albaiah.boattabar his career. And this profession imposes upon that possesses special skills, qualify him to do his roles. The teacher experimenter, researcher and owner of philosophy and organizer and director of the positions and educational director of the interactions of classroom and non-classroom. And educational systems that are responsible for the preparation of the emerging needs constant review in order to improve internal Kvaiadtha select the best input consistent with the reality of education, so as
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreDerivatives of Schiff-bases possess a great importance in pharmaceutical chemistry. They can be used for synthesizing different types of bioactive compounds. In this paper, derivatives of new Schiff bases have been synthesized from several serial steps. The acid (I) was synthesized from the reaction of dichloroethanoic acid with 2 moles of p-aminoacetanilide. New acid (I) converted to its ester (II) via the reaction of (I) with dimethyl sulphate in the present of anhydrous of sodium carbonate and dry acetone. Acid hydrazide (III) has been synthesized by adding 80% of hydrazine hydrate to the new ester using ethanol as a solvent. The last step included the preparation of new Schiff-bases (IV-VIII) by the reaction of acid hydrazide with
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.