Background: Due to the complicated and time-consuming physiological procedure of bone healing, certain graft materials have been frequently used to enhance the reconstruction of the normal bone architecture. However, owing to the limitations of these graft materials, some pharmaceutical alternatives are considered instead. Chitosan is a biopolymer with many distinguishing characteristics that make it one of the best materials to be used as a drug delivery system for simvastatin. Simvastatin is a cholesterol lowering drug, and an influencer in bone formation process, because it stimulates osteoblasts differentiation, bone morphogenic protein 2, and vascular endothelial growth factor. Objectives: histological, histochemical and histomorphometrical analyses were carried out to evaluate the effect of local application of chitosan simvastatin nanoparticles (ChSimN) on bone healing. Materials and Methods: New Zealand rabbits (n=14) were used in this study. Two defects were made: one on the right side (the experimental side) that received ChSimN and the other one on the left side (the control side), which left to heal spontaneously. Seven rabbits were sacrificed after 2 weeks of the experiments, while the others after 4 weeks. Bone samples were taken for histological and histomorphometric study after the sacrifice. Results: The histological study, using both H&E and Masson’s Trichrome stain, revealed that the ChSimN group recorded an increased amount of bone formation at both time points. Histomorphometrical analysis recorded a significant increment in bone marrow and trabecular areas in the ChSimN group. Conclusion: ChSimN had a pronounced effect on bone formation.
Background: Decontamination of gutta percha cones was important factor for success of root canal treatment. The aim of the present in vitro study was to identify and to compare the antimicrobial effect of following disinfection solutions: 0.2% chlorhexidine gluconate, Iodine, tetracycline hydrochloride solution, EDTA & formocresol mixed with zinc oxide eugenol, on E faecalis, E coli and Candida albicans using sensitivity test Materials and Methods: Three types of microorganisms were isolated from infected root canals (E faecalis, E coli and Candida albicans) and cultured on Mueller Hinton agar petri-dishes. Disinfection of gutta percha cones done by immersion in six disinfection solutions (six groups), the groups are: distill water (used a
... Show MoreThe study aims to investigate the effect of Al2O3 and Al additions to Nickel-base superalloys as a coating layer on oxidation resistance, and structural behavior of nickel superalloys such as IN 738 LC. Nickel-base superalloys are popular as base materials for hot components in industrial gas turbines such as blades due to their superior mechanical performance and high-temperature oxidation resistance, but the combustion gases' existence generates hot oxidation at high temperatures for long durations of time, resulting in corrosion of turbine blades which lead to massive economic losses. Turbine blades used in Iraqi electrical gas power stations require costly maintenance using traditional processes regularly. These blades are made
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MorePiled raft is commonly used as foundation for high rise buildings. The design concept of piled raft foundation is to minimize the number of piles, and to utilize the entire bearing capacity. High axial stresses are therefore, concentrated at the region of connection between the piles and raft. Recently, an alternative technique is proposed to disconnect the piles from the raft in a so called unconnected piled raft (UCPR) foundation, in which a compacted soil layer (cushion) beneath the raft, is usually introduced. The piles of the new system are considered as reinforcement members for the subsoil rather than as structural members. In the current study, the behavior of unconnected piled rafts systems has been studie
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.