Preferred Language
Articles
/
jkmc-31
Clinical and experimental Study to evaluate the effect of Biphasic calcium phosphate collagen composite (cpcc) on healing of bone defects after oral surgical procedures
...Show More Authors

Background: A recent discoveries used for reconstruction in maxillofacial surgery is the composite bone graft materials. The availability of collagen I matrix make our choice to use this material in surgery .It is biomaterials that its structure could be modified by simple techniques. Studies to find a new materials use for bone reconstruction is to overcome the disadvantages of autogenous bone and the synthetic resorbable bone substitutes.

Objectives: This study was done to evaluate the effect of biphasic calcium phosphate collagen composite (ccpc) on healing of bone defects after oral surgical procedures.

Type of the study: A cross sectional study.

Method: It involved 60 patients, 35 male and 25 female, age (15-40) yearsand experimental animals study involved sixty rabbits.The study was done in Department of Maxillofacial surgery in Al anbarCollege of Dentistry (2015-2016).These patients were received tooth extraction, and other minor surgical procedures .Clinical and radiographical examination and patients consents are done before surgery. The surgery was done under local anesthesia.The resulting bone cavities are filled with composite bone graft material composed from combination of lyophilized hydrolysed collagen sponge (Hemospon),Brasil and Osteon II bone graft material,Korea .The area is closed with 3/0 block silk suture .Antibiotic cover (Ampicillin 500mg ×4) for 1 week was prescribed. The patients were followed up by careful clinical examination with radiograph 15-30 days after surgery. .Sixty New Zeleandi White rabbit were used in our study for histopathologicalexamination.Intraperitoneal injection of ketamine 10 mg with XYL-M2 solution 20 mg xylazine base used to anesthetize the animals. (5mm diameter) bone defects were made using straight surgical hand piece and bur in anterior mandibular region and filled with each material.  The study design involve the following groups: group 1( involve 15 rabbit; the defect was made and filled with blood clot only (control group),group 2( involve 15 rabbit, the defect was made and filled with collagen sponge only),group 3(Involve 15 rabbit, the defect was made and filled with Osteon II bone graft only),group4( involve 15 rabbit, the defect was made and filled with Osteon II bone graft +collagen (Composite bone graft).The flap were closed 3/0 black silk suture. The rabbits were killed after 30 days. 10 cmexcisional biopsy specimen was taken from the paramandibular area and placed in 10%formalin then send histopathologicalexamination.

Results:  Clinically, the treated area show good healing with absence of infection .Radiographs during follow up period show radiopacity indicating new bone formation .The results of experimental animals (Rabbits) indicategrowth new bone . In group 1 and group2, the center of the defects was depressed by surrounding tissues  Eung et al, While, in group 3&group 4, the graft materials maintained the space and the center of the defect did not depress. Statistical analysis indicates that during 4 th week ,the highest healing % is (100%) in group 3 &group4 in compared to control group (50%)..A significant difference in healing % was found among the treated groups.

Conclusion:The result indicates that biphasic calcium phosphate collagen composite can be efficiently utilized clinically.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
On Fully Stable Banach Algebra Modules and Fully Pesudo Stable Banach Algebra Modules
...Show More Authors

The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Coronavirus Disease Diagnosis, Care and Prevention (COVID-19) Based on Decision Support System
...Show More Authors

              Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Deep Learning and Its Role in Diagnosing Heart Diseases Based on Electrocardiography (ECG)
...Show More Authors

Diagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi Journal Of Science
Paper based glucose biosensor depending on SPCE modified with hemoglobin and silver nanoparticles
...Show More Authors

The direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li

... Show More
Scopus
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref