Background: Dental implants act as infrastructure for fixed restoration to look like as a natural tooth. Osseointegration is a biological events and considered as a base for success of dental implant. The aim of this study is to evaluate the bond strength between bone and Ti implant coated with mixture of nano hydroxyapatite-chitosan-collagen compared with Ti implants coated with nano hydroxyapatite implanted in rabbit tibia, after different period of implantation time (two and six weeks) by torque removal test. Material and methods: 36 screws of commercially pure titanium; 8mm in length and 3mm diameter , 18 screws coated with mixture of nano hydroxyapatite-chitosan-collagen and18 screws coated with nano hydroxyapatite by dip coating. Structural characteristics was assessed by scanning electron microscope, and FTIR analysis. The screws were implanted in 18 healthy adult male New Zeeland rabbits each tibia received one screw, right tibia received screw coated with nano hydroxyapatite while left tibia received screw coated nano hydroxyapatite-chitosan-collagen composite. Removal torque test was done by torque meter to determine the highest torque value necessary to remove the implants from tibia bone after different period of time of implantation(2 and 6 weeks). Result: Nano hydroxyapatite-chitosan-collagen composite coating was resulting in higher torque removal value than nano hydroxyapatite coating for two periods of time. Conclusion: Concluded that addition of collagen and chitosan to nano hydroxyapatite was more efficient in rapid bone formation than nano hydroxyapatite only.
Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
A total of 61 bat specimens belonging to three species were collected from four distinct sites in the middle of Iraq. Five species of acarine ectoparasites on bats were found. These were: Steatonyssus periblepharus Kolenati, Spinturnix acuminatus (C. L. K.). Cheletonella sp. Rhizoglyphus sp., and Argas sp. Three of the recorded species were new to Iraqi fauna. The abundance and accurence of each parasite was varied from one species to another. S. periblepharus aria S. acuminatus were the most common species found in this study.
During the two last decades ago, audio compression becomes the topic of many types of research due to the importance of this field which reflecting on the storage capacity and the transmission requirement. The rapid development of the computer industry increases the demand for audio data with high quality and accordingly, there is great importance for the development of audio compression technologies, lossy and lossless are the two categories of compression. This paper aims to review the techniques of the lossy audio compression methods, summarize the importance and the uses of each method.
The aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.
Background: Premature infant born with immature body system, their organs are not ready for extra uterine life, and they are unable to deal with external stress, which could alter body functions such as cardio-respiratory function. In addition, poor muscle tone increases the chance of developing an abnormal posture. To reduce this instability, applying developmental care such as nesting is vital to promote cardio-respiratory stability, maintain position, and reduce stress in preterm. Objectives: The study aims to assess the impact of the nesting technique on preterm cardio-respiratory parameters in various positions (supine, prone, and right lateral). Methodology: The research used randomized controlled trial des
... Show MoreAn experimental work has been conducted on wall attachment fluidics amplifiers, one of them to study the effect of output pressure or load on the amplifier performance. The output load has been simulated as a piston connected to the device output and the piston can be loaded accordingly. The results shows that the output volume flow rate increases as the supply pressure increases under different load and the output pressure remains constant as the supply pressure increases under constant load.
In this paper, a literature survey was introduced to study of enhancing the hazy images , because most of the images captured in outdoor images have low contrast, color distortion, and limited visual because the weather conditions such as haze and that leads to decrease the quality of images capture. This study is of great importance in many applications such as surveillance, detection, remote sensing, aerial image, recognition, radar, etc. The published researches on haze removal are divided into several divisions, some of which depend on enhancement the image, some of which depend on the physical model of deformation, and some of them depend on the number of images used and are divided into single-image and multiple images dehazing model
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More