Background: Improved glucose level control with insulin injections have allowed for the diabetic population to live longer and healthier lives. Unfortunately diabetes remains a worldwide epidemic disease with multiple health implications. Specifically, its effects upon fracture healing are compromised in diabetics with as high as 87% recovery delay relative to “healthy†counterparts. Current medical treatments for bone injuries have been largely focused on replacing the lost bone with allogenic or autogenous bone grafts, beta-tricalcium phosphate (β -TCP), a ceramic alloplast, has interconnected system of micropores, has been widely used as a biologically safe osteoconductive bone substitute. The aim of this study was histological evaluation of effect of topical application of β –TCP on bone healing of diabetic rabbit. Materials and methods: Sixty New Zealand rabbits used in this study were divided into three groups for four healing intervals the experimental groups were: 1-Control group(C).2-Diabetic rabbits received insulin treatment regarded as controlled diabetes mellitus (CDM)group.3-Diabetic rabbits did not receive any treatment regarded as uncontrolled diabetes mellitus (UDM)group. All animals subjected to surgical operation in right tibia, creating bone defect 3mm in depth and 4mm in diameter filled with β-Tricalcium Phosphate. Animals' scarifications were done in 5 day, 2, 4 and 6 weeks durations. Routine processing and sectioning technique was performed for histological evaluation. Results: Histological findings indicated that bone defects in control(C) and controlled diabetes mellitus (CDM) groups showed early bone formation, mineralization and maturation in comparison to healing of uncontrolled diabetes mellitus (UDM) group. Histomorphometric analysis for all bone parameters examined in this study, showed variation in significance among all groups in different durations. Conclusion: The study revealed that application of β-TCP was more effective in enhancement of bone regeneration and in acceleration of bone healing process in controlled diabetes as compared to the uncontrolled one.
Improving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of
... Show MoreColor image compression is a good way to encode digital images by decreasing the number of bits wanted to supply the image. The main objective is to reduce storage space, reduce transportation costs and maintain good quality. In current research work, a simple effective methodology is proposed for the purpose of compressing color art digital images and obtaining a low bit rate by compressing the matrix resulting from the scalar quantization process (reducing the number of bits from 24 to 8 bits) using displacement coding and then compressing the remainder using the Mabel ZF algorithm Welch LZW. The proposed methodology maintains the quality of the reconstructed image. Macroscopic and
تشكل التغيرات الحاصلة في اسعار النفط تحديا" حقيقيا" لاستمرار عملية النمو في العراق, وامام الحكومة فرصة كبيرة لإيجاد حلول ناجعة لمشكلة تزايد عجز الموازنة العامة من خلال اللجوء الى اصدار ادوات الدين العام الداخلي والخارجي, وهذا يتطلب بناء استراتيجية لإقامة وتطوير سوق السندات الحكومية في العراق, لتتمكن الحكومة من خلاله توفير مصادر تمويل اضافية, تسهم في تمويل الانفاق الاستثماري الحكومي ودعم النمو ودعم
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
Abstract
Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More