Preferred Language
Articles
/
jkmc-31
Clinical and experimental Study to evaluate the effect of Biphasic calcium phosphate collagen composite (cpcc) on healing of bone defects after oral surgical procedures
...Show More Authors

Background: A recent discoveries used for reconstruction in maxillofacial surgery is the composite bone graft materials. The availability of collagen I matrix make our choice to use this material in surgery .It is biomaterials that its structure could be modified by simple techniques. Studies to find a new materials use for bone reconstruction is to overcome the disadvantages of autogenous bone and the synthetic resorbable bone substitutes.

Objectives: This study was done to evaluate the effect of biphasic calcium phosphate collagen composite (ccpc) on healing of bone defects after oral surgical procedures.

Type of the study: A cross sectional study.

Method: It involved 60 patients, 35 male and 25 female, age (15-40) yearsand experimental animals study involved sixty rabbits.The study was done in Department of Maxillofacial surgery in Al anbarCollege of Dentistry (2015-2016).These patients were received tooth extraction, and other minor surgical procedures .Clinical and radiographical examination and patients consents are done before surgery. The surgery was done under local anesthesia.The resulting bone cavities are filled with composite bone graft material composed from combination of lyophilized hydrolysed collagen sponge (Hemospon),Brasil and Osteon II bone graft material,Korea .The area is closed with 3/0 block silk suture .Antibiotic cover (Ampicillin 500mg ×4) for 1 week was prescribed. The patients were followed up by careful clinical examination with radiograph 15-30 days after surgery. .Sixty New Zeleandi White rabbit were used in our study for histopathologicalexamination.Intraperitoneal injection of ketamine 10 mg with XYL-M2 solution 20 mg xylazine base used to anesthetize the animals. (5mm diameter) bone defects were made using straight surgical hand piece and bur in anterior mandibular region and filled with each material.  The study design involve the following groups: group 1( involve 15 rabbit; the defect was made and filled with blood clot only (control group),group 2( involve 15 rabbit, the defect was made and filled with collagen sponge only),group 3(Involve 15 rabbit, the defect was made and filled with Osteon II bone graft only),group4( involve 15 rabbit, the defect was made and filled with Osteon II bone graft +collagen (Composite bone graft).The flap were closed 3/0 black silk suture. The rabbits were killed after 30 days. 10 cmexcisional biopsy specimen was taken from the paramandibular area and placed in 10%formalin then send histopathologicalexamination.

Results:  Clinically, the treated area show good healing with absence of infection .Radiographs during follow up period show radiopacity indicating new bone formation .The results of experimental animals (Rabbits) indicategrowth new bone . In group 1 and group2, the center of the defects was depressed by surrounding tissues  Eung et al, While, in group 3&group 4, the graft materials maintained the space and the center of the defect did not depress. Statistical analysis indicates that during 4 th week ,the highest healing % is (100%) in group 3 &group4 in compared to control group (50%)..A significant difference in healing % was found among the treated groups.

Conclusion:The result indicates that biphasic calcium phosphate collagen composite can be efficiently utilized clinically.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Adsorption of Hydrogen and Methane as Single Gases on Activated Carbon
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Sat Feb 01 2020
Journal Name
Alexandria Engineering Journal
Impact of development on Baghdad’s urban microclimate and human thermal comfort
...Show More Authors

View Publication
Scopus (39)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Morphology, chemical and electrical properties of CdO Nanoparticles on porous silicon
...Show More Authors

In this paper, CdO nanoparticles prepared by pulsed laser deposition techniqueonto a porous silicon (PS) surface prepared by electrochemical etching of p-type silicon wafer with resistivity (1.5-4Ω.cm) in hydrofluoric (HF) acid of 20% concentration. Current density (15 mA/cm2) and etching times (20min). The films were characterized by the measurement of AFM, FTIR spectroscopy and electrical properties.

  Atomic Force microscopy confirms the nanometric size.Chemical components during the electrochemical etching show on surface of PSchanges take place in the spectrum of CdO deposited PS when compared to as-anodized PS.

The electrical properties of prepared PS; namely current density-voltage charact

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Negative Reflections of Ottomans and Persian struyy on Iraq (1508 – 1914)
...Show More Authors

Continuous conflict between Parisian and Ottoman states the results that Iraq became as
aground for their battles which leads to their own interests in Iraq which are shape their
strategy. The conflict continues for long time. In spite of, they signed many treatments and
protocols between the two sides, as Arzarom treaty , the first and the second, Tahran protocols
, and Astana protocol. This conflict, no sides of them to dose any part of their land, but these
treaties leaded to a big loss to Iraq ,which lost parts of it's land and water area in Ahwaz and
shatt AL-Arab, so, Iraq became as a smoth target for their interests, and lost its
sovereignty,and lost self-govern of the country country . so the research conclud

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 03 2021
Journal Name
European Journal Of Humanities And Educational Advancements (
Impact of ASSURE Model on Mathematical Correlation and Achievement in Mathematics
...Show More Authors

Publication Date
Mon Feb 01 2021
Journal Name
Annals Of Fuzzy Mathematics And Informatics
Topology of cubic bipolar structures and its application on Q-algebra
...Show More Authors

In this paper, we define a cubic bipolar subalgebra, $BCK$-ideal and $Q$-ideal of a $Q$-algebra, and obtain some of their properties and give some examples. Also we define a cubic bipolar fuzzy point, cubic bipolar fuzzy topology, cubic bipolar fuzzy base and for each concept obtained some of its properties.

Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Public Procurement Crisis of Iraq and its Impact on Construction Projects
...Show More Authors

 

The public procurement crisis in Iraq plays a fundamental role in the delay in the implementation of construction projects at different stages of project bidding (pre, during, and after). The procurement system of any country plays an important role in economic growth and revival. The paper aims to use the fuzzy logic inference model to predict the impact of the public procurement crisis (relative importance index and Likert scale) was carried out at the beginning to determine the most important parameters that affect construction projects, the fuzzy analytical hierarchy process (FAHP) to set up, and finally, the fuzzy decision maker's (FDM) verification of the parameter for comparison with reality. Sixty-five

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
FTIR and Electrical Behavior of Blend Electrolytes Based on (PVA/PVP)
...Show More Authors

Polymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (15)
Scopus