Background: The repair of bone defects remains a major clinical orthopaedic challenge. Bone is a highly vascularised tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. Angiogenesis thus plays a pivotal role in skeletal development and bone fracture repair. The role of angiogenic and osteogenic factors in the adaptive response and interaction of osteoblasts and endothelial cells during the multi step process of bone development and repair will be highlighted in this study. This study aimed to identify the role of local exogenous vascular endothelial growth factor in bone healing and to analyze the expression of VEGF by immunohistochemistry in created bone defect after application with different biomaterials in a rat model. Materials and methods: In this experimental study eighteen male Albino rats, weighing (300-400) gram, aged (6-8) months were used and maintained under control conditions of temperature, drinking and food consumption. The animals were subjected for a surgical operation of medial sides of both tibiae bone ( right side was considered as experimental site ,while left be the control one), in control group the bone defect treated with local application of 1µm of normal saline, while experimental treated with local application of 1µm of VEGF .The rats were sacrificed at 3,7,10 days after surgery(six rats for each period). Bone healing was histologically examined with immunohistochemical localization of VEGF Results: Bone defect treated with local application of VEGF shows an early osteoid tissue deposition with high cell count for osteoblast, osteocyte and osteoclast. Immunohistochemical evaluation for VEGF by stromal cells, reported to be higher with significant difference in VEGF group in comparison to control. Conclusion: The study illustrated that low application of VEGF could be an effective therapeutic expression for bone injuries; these data are promising for a possible future clinical usage.
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreTo improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show MoreThe Bangestan reservoir, which occurs in the Ahwaz oilfield, consists of the middle Cretaceous limestone Ilam and Sarvak Formations that were deposited in the Zagros Basin. The reservoir is divided into ten Zones (A to J) formed in the upper Albian-Santonian and contains considerable hydrocarbon accumulations. The limestones were deposited on an extensive shallow carbonate platform on a passive margin and are dominated by rudist biostrome and grainstone facies. Paleogeographical changes mean that identification of the facies is complex. Seismic stratigraphy and isotopic data are used to better understand the structural and geological setting and develop an understanding of the sedimentary environment. The results show that the rudist biostr
... Show MoreThe study using Nonparametric methods for roubust to estimate a location and scatter it is depending minimum covariance determinant of multivariate regression model , due to the presence of outliear values and increase the sample size and presence of more than after the model regression multivariate therefore be difficult to find a median location .
It has been the use of genetic algorithm Fast – MCD – Nested Extension and compared with neural Network Back Propagation of multilayer in terms of accuracy of the results and speed in finding median location ,while the best sample to be determined by relying on less distance (Mahalanobis distance)has the stu
... Show MoreRecently Tobit Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique and Bayesian hierarchical model with adaptive ridge regression technique .
in double adaptive elastic net technique we assume different penalization parameters for penalization different regression coefficients in both parameters λ1and λ2 , also in adaptive ridge regression technique we assume different penalization parameters for penalization different regression coefficients i
... Show MoreThe present work is an attempt to develop design data for an Iraqi roof and wall constructions using the latest ASHRAE Radiant Time Series (RTS) cooling load calculation method. The work involves calculation of cooling load theoretically by introducing the design data for Iraq, and verifies the results experimentally by field measurements. Technical specifications of Iraqi construction materials are used to derive the conduction time factors that needed in RTS method calculations. Special software published by Oklahoma state university is used to extract the conduction factors according to the technical specifications of Iraqi construction materials. Good agreement between the average theoretical and measured cooli
... Show MoreCitric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the
... Show MoreActivated carbon (AC) is a highly important adsorbent material, as it is a solid form of pure carbon that boasts a porous structure and a large surface area, making it effective for capturing pollutants. Thanks to its exceptional features, AC is widely used for purifying water that is contaminated with odors and removing dyes in a cost-effective manner. A variety of carbonic materials have been employed to prepare AC, and this study aimed to evaluate the suitability of utilizing waste mango and avocado seeds for this purpose, followed by testing their efficacy in removing dye from aqueous solutions. The results indicate that using waste mango and avocado as AC is technically feasible, achieving dye removal percentages of 98% and 93%,
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show More