Preferred Language
Articles
/
jbcd-523
Stem cells a novel approach to periodontal regeneration (A review of literature)
...Show More Authors

In this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 14 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Periodontal health status of heavy and light smokers and its correlation with salivary superoxide dismutase enzyme (A comparative study)
...Show More Authors

Background: Periodontal disease is a chronic bacterial infection that affects the gingiva and bone supporting the teeth. Smoking, which is an important risk factor for periodontitis, induce oxidative stress in the body and cause an imbalance between reactive oxygen species (ROS) and antioxidants, such as superoxide dismutase (SOD). This study aimed to evaluate the influence of smoking on periodontal health status by estimating the levels of salivary SOD level in non-smokers (controls) and light and heavy smokers and to test the correlation between the SOD enzyme level and the clinical periodontal parameters in each group. Materials and Methods: The study sample consisted of 75 male, with age ranged from 35 to 50 years. Clinically, the perio

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
EFFECT OF HARDENING TO DROUGHT TOLERANCE ON THE MOISTURE CONTENT OF SUNFLOWER PLANT. I. MOISTURE PERCENTAGEIN ROOT AND STEM
...Show More Authors

Two field experiments were conducted during the spring seasons of 2000,2001.The aim was to study the effect of hardening to drought tolerance on moisture percentage in root and stem of sunflower plant during growth stages . Asplit-split plots design was used with three replications.The main plots included irrigation treatments:irrigation to100%(full irrigation),75and50%of available soil water.The sub plots were the cultivars Euroflor and Flame.The sub-sub plots represented four seed soaking treatments :Control(unsoaked),soaking in water ,Paclobutrazol solution(250ppm),and Pix solution(500ppm). The soaking continued for 24 hours then seeds were dried at room temperature until they regained their original weight. Amount of water

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
The grammatical approach to explain Bant Souad's poem (Explanation of Ibn Hisham as a model) a . M . Dr. Abdul Hamid Hamad shehatha Mustansiriya University Faculty of Basic Education the department of Arabic language
...Show More Authors

 

This study is concerned with shedding light on the grammatical method of Ibn Hisham Al-Ansari (761 AH), in his explanation of Bant Souad’s poem by the poet Kaab bin Zuhair, and I included a brief description of Ibn Hisham’s life with a number of explanations of this poem, then clarified the most important features of this method The grammar represented by his reliance on hearing and presenting it to analogy with mention of types of analogy, as well as his attribution of opinions to their owners with weighting, selection and balancing, and his attention to reasoning and a number of grammatical ailments, and his approach is also distinguished by following the method of fractal.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (31)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2023
Journal Name
Chemical Engineering Research And Design
Treatment of petroleum refinery wastewater by electrofenton process using a low cost porous graphite air-diffusion cathode with a novel design
...Show More Authors

View Publication
Scopus (30)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Wed Jun 25 2025
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Phytochemical Analysis and Prostate Cancer Cytotoxicity of Iraqi Apium graveolens: A GC-MS Approach
...Show More Authors

Apium graveolens has been utilized for a multitude of purposes due to its diverse pharmacological characteristics. On the other hand, little is known about how the fatty acids (saturated and unsaturated) terpenes and steroids found in Iraqi Apium graveolens affect the human cancer cells. The purpose of this study was to examine the effects of Iraqi Apium graveolens petroleum ether extract on the human prostate cancer cell line (PC3). Subsidiary extraction and phytochemical analysis by GC/MS were performed.The dry and fresh aerial parts (leaves and stem) of Apium graveolens were extracted using a Soxhlet device with 70 % ethanol, then fractionated with petroleum ether. Then Gas Chromatography System was used to identify the bioactive

... Show More
View Publication
Scopus
Publication Date
Sat Mar 05 2016
Journal Name
International Journal Of Science And Research (ijsr)
Molecular Docking Studies of Human Ubiquitin Conjugating Enzyme RAD6: A Systematic in Silico Approach
...Show More Authors

This study confirms the ubiquitin conjugating enzyme 2B (Rad6) plays a significant role in the DNA repair pathway also because the ubiquitin-conjugating pathway. The DNA repair pathway could be a variety of bypass repair mechanism where the broken base pair is bypassed by permitting the replication fork to labor under the site of injury. This is often done by a shift mechanism wherever deoxyribonucleic acid enzyme - δ is switched with DNA enzyme - η (DNAP - η). Site of DNAP - η is massive enough to permit the broken ester to labor under, and so bypass the broken nucleotide. However, this is often potential solely through the involvement of Proliferating cell nuclear antigen (PCNA) that could be a processivity issue and it acts as a plat

... Show More
View Publication Preview PDF
Crossref