Background: Tooth eruption is a more general process, however, which includes certain posteruptive tooth movements. There are two fundamental requirements for both tooth eruption to occur: (1) Require soft tissue, intervening between tooth structure and alveolar bone, which plays an important role in regulating the remodeling of adjacent tissues. (2) Require bone turnover that is temporally and spatially regulated to facilitate specific translocations of teeth through alveolar bone These amniotic stem cells are multipotent and able to differentiate into various tissues, which may be useful for human application and recently it used in many medical branches. CD34 is an endothelial marker that is extensively used in immunohistochemistry and most vascular endothelial cells. Expression of the stem cell antigen CD34 is a defining hallmark of hemopoietic stem cells and progenitors. This study aimed to study the expression of CD34 by dental cells involved in tooth eruption after administration of amniotic stem cell Materials and Methods: forty eight albino Swiss mice of one day old age injected with isolated amniotic stem cells in the anterior region of maxilla (incisors area) other 16 mice injected with saline represents control. Sacrifice 4 mice for each period (4, 7, 10, and 13) day old age. The result were studied histologically and immunohistochemistry. Results: Immunohistochemical result revealed positive expression of CD34 in pulp (Vascular, Paravascular), Mesenchymal cell and in the Dental sac of different groups. Coincidence test of expression marker CD34 in various studied group shows that Chorion application affected on CD34 expression in pulp while Amniotic fluid affected on dental sac. Conclusion Immunohistochemical study of expression marker CD34 in various studied groups show that chorion application affected on CD34 in pulp .While amniotic fluid affected on dental follicle.
This study was aimed to assess the efficiency of N.oleander to remove heavy metals such as Copper (Cu) from wastewater. A toxicity test was conducted outdoor for 65-day to estimate the ability of N.oleander to tolerate Cu in synthetic wastewater. Based on a previous range-finding test, five concentrations were used in this test (0, 50, 100, 300, 510 mg/l). The results showed that maximum values of removal efficiency was found 99.9% on day-49 for the treatment 50 mg/l. Minimum removal efficiency was 94% day-65 for the treatment of 510 mg/l. Water concentration was within the permissible limits of river conservation and were 0.164 at day-35 for the 50 mg/l treatment, decreased thereafter until the end of the observation, and 0.12 at d
... Show Morehe assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s
... Show MoreIn this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains
Drilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.
Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.
This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.
The experim
... Show MoreThis paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.