Preferred Language
Articles
/
jbcd-3143
Surface Characterization of PEKK Modified by stron-tium –hydroxyapatite coating as implant material Via the magnetron sputtering Deposition technique
...Show More Authors

Background: The best material for dental implants is polyetherketoneketone (PEKK). However, this substance is neither osteoinductive nor osteoconductive, preventing direct bone apposition. Modifying the PEKK with bioactive elements like strontium hydroxyapatite is one method to overcome this (Sr-HA). Due to the technique's capacity to provide better control over the coating's properties, RF magnetron sputtering has been found to be a particularly useful technique for deposition.

Materials and methods : With specific sputtering conditions, the RF magnetron technique was employed to provide a homogeneous and thin coating on Polyetherketoneketone substrates.. the coatings were characterized by Contact angle, adhesion test, X-ray diffraction (XRD), atomic force microscope and Elemental Analysis with Energy Dispersive X-Ray (EDX)

Results : indicated that strontium hydroxyapatite had successfully deposited onto the surface with significant improvement in the wettability value to provide a suitable environment for cell attachment, spreading, proliferation, and differentiation

Conclusion: Coating PEKK with RF magnetron sputtering can provide homogeneous surfaces laying the groundwork for improving PEKK's potential bioactivity, such as surface wettability. Wetting qualities are critical in implantable materials and are used to predict future osseointegration success.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Simole matimatical technique in leaser cavity design and manufacturing
...Show More Authors

In this research design was treated gap laser mathematically and practically Bashaddam model Raasi simple and new and we have found that there is a good match in the practical and theoretical results

View Publication Preview PDF
Publication Date
Wed Oct 05 2016
Journal Name
Al-academy
Dialectical relationship between digital Technique and aesthetic Picture TV
...Show More Authors

The technical development has significant effects on the mediator Alcinmatugrave, and TV originated mainly based on technical, with the development and the continuation of these technologies and the enormous impact on the level of the television picture, initially dramas in recent times approaching in the aesthetic composition of the film thanks to the employment of modern digital technologies, Montag was not only one of the cinematic elements that went into television thanks to technical developments analogue and digital, and which added the possibility of large processors in the picture, high-definition digital cameras that have led to dispense often for artificial lighting intensive imaging light available, as these cameras have helpe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Adaptive Medical Image Watermarking Technique based on Wavelet Transform
...Show More Authors

In this paper, an adaptive medical image watermarking technique is proposed based on wavelet transform and properties of human visual system in order to maintain the authentication of medical images. Watermark embedding process is carried out by transforming the medical image into wavelet domain and then adaptive thresholding is computed to determine the suitable locations to hide the watermark in the image coefficients. The watermark data is embedded in the coefficients that are less sensitive into the human visual system in order to achieve the fidelity of medical image. Experimental results show that the degradation by embedding the watermark is too small to be visualized. Also, the proposed adaptive watermarking technique can preserv

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
International Journal Of Pure And Apllied Mathematics
A SEMI ANALYTICAL ITERATIVE TECHNIQUE FOR SOLVING DUFFING EQUATIONS
...Show More Authors

View Publication
Crossref (11)
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Thu Sep 15 2022
Journal Name
Romanian Neurosurgery
Coil migration during pressure-cooker technique for cerebral AVM
...Show More Authors

Introduction: In recent decades, the endovascular treatment of cerebral arteriovenous malformations (AVMs) has advanced. However, it still carries risks of unanticipated complications. Coil migration is a reported complication of aneurysmal coiling procedures. Herein, we report a case of early intraprocedural coil migration during pressure cooker technique embolization of right thalamic AVM, discussing the management and potential explanations. The literature showed no report of coil migration after the pressure cooker technique in the form of coil-augmented Onyx injection technique (CAIT). Case description: An otherwise healthy 26-year-old female suddenly developed a severe headache with no loss of consciousness. Computed tomograp

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Journal Of King Saud University - Science
A semi-analytical iterative technique for solving chemistry problems
...Show More Authors

View Publication
Crossref (17)
Crossref
Publication Date
Sat Nov 26 2022
Journal Name
Sensors
3D Object Recognition Using Fast Overlapped Block Processing Technique
...Show More Authors

Three-dimensional (3D) image and medical image processing, which are considered big data analysis, have attracted significant attention during the last few years. To this end, efficient 3D object recognition techniques could be beneficial to such image and medical image processing. However, to date, most of the proposed methods for 3D object recognition experience major challenges in terms of high computational complexity. This is attributed to the fact that the computational complexity and execution time are increased when the dimensions of the object are increased, which is the case in 3D object recognition. Therefore, finding an efficient method for obtaining high recognition accuracy with low computational complexity is essentia

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Compression-based Data Reduction Technique for IoT Sensor Networks
...Show More Authors

Energy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (21)
Scopus Clarivate Crossref