Background. Bone healing is a complex and dynamic process that represents a well-orchestrated series of biological events of cellular recruitment, proliferation, and differentiation. The use of medicinal plants in bone healing has attracted increasing interest because of their lower side effects. Punica granatum seed oil (PSO) contains high levels of phenolic compounds, promotes osteoblast function, and plays an important role in bone remodeling. A gelatin sponge (Spongostan) is a hemostatic agent that is extensively applied as scaffolds in engineering and as drug carriers in the medical field. This study aimed to evaluate the effectiveness of PSO for bone healing enhancement. Twenty adult male New Zealand rabbits, weighing an average of 1.5–2 kg, were used in this study. Three intrabony holes were created in the tibiae of each animal, which were filled with a gelatin sponge (GS group) and combined gelatin sponge and PSO (GS/PSO group). Holes without material application were designated as the control group (C group). The animals were sacrificed at the healing duration (2–4 weeks) to prepare bone specimens for histological and histomorphometric analyses. Results. Histological findings indicated that the bone defects in the GS/PSO group showed more bone formation, mineralization, and maturation compared with the C and GS groups. Multiple group differences for bone cells showed a highly significant difference among all groups in the 2- and 4-week healing periods except for the C/GS and GS/GS/PSO groups at 4-weeks duration. Furthermore, highly significant results were obtained between both durations regarding the trabecular area, trabecular number, and bone marrow area. Conclusion. The study revealed that the combined application of GS and PSO was more effective in enhancing bone regeneration and accelerating bone healing compared with the other groups.
The current study involves placing 135 boreholes drilled to a depth of 10 m below the existing ground level. Three standard penetration tests (SPT) are performed at depths of 1.5, 6, and 9.5 m for each borehole. To produce thematic maps with coordinates and depths for the bearing capacity variation of the soil, a numerical analysis was conducted using MATLAB software. Despite several-order interpolation polynomials being used to estimate the bearing capacity of soil, the first-order polynomial was the best among the other trials due to its simplicity and fast calculations. Additionally, the root mean squared error (RMSE) was almost the same for the all of the tried models. The results of the study can be summarized by the production
... Show MoreMultiple sclerosis (MS) is a neurodegenerative disorder with various clinical types. Glial fibrillary acidic protein (GFAP) is significantly elevated in the cerebrospinal fluid (CSF) of MS patients compared with that of healthy controls. The aim of this study is to evaluate serum levels of GFAP in relation to disease activity in relapsing-remitting MS patients and to compare them with those of healthy controls. Method: This study involved 58 MS patients of relapsing-remitting MS (RRMS) type, 22 in an active stage of the disease and 36 in remission, and 50 healthy individuals as age- and sex-matched controls. Blood samples were taken from the patients at the MS Clinic of the Baghdad Teaching Hospital, and the serum levels of GFAP were determ
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show Moreيسعى البحث إلى الاهتمام بإحدى الوظائف المهمة في إدارة الموارد البشرية وهي تقويم الأداء التي تواجه مجموعة من الانتقادات والآراء السلبية، اذ ظهر في الأّونة الأخيرة أنموذج جديد يمكن إن يتجاوز تلك السلبيات وهو أنموذج التغذية العكسية المتعدد المصادر درجة .وقد حاول الباحثان توظيف هذا المفهوم في اثنتين من المنظمات العامة العراقية هما (دائرة كهرباء الوسط) التابعة لوزارة الكهرباء
و (دائرة الماء والمجاري) ال
Background and Aim: Canine parvovirus 2 (CPV-2) is a highly contagious virus that infects wild and domestic canines. Despite the use of a routine vaccination protocol, it is endemic in Iraq. The genetic drift of CPV-2 is a major issue worldwide because it abrogates virus control. In Iraq, there is a knowledge gap regarding the genetic sequences of asymptomatic and symptomatic CPV-2 cases. Therefore, this study aimed to perform a genetic analysis of viral capsid protein 1 (VP1) and viral capsid protein 2 (VP2), two major capsid-encoding genes, to demonstrate the possible role of certain mutations in triggering infection. Materials and Methods: Symptomatic and asymptomatic cases (n = 100/each) were tested by a polymerase chain reacti
... Show MoreThis article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
paid recent developments in the information and communications technology and the accompanying developments in the global market to pay particular accounting information users to demand more sophistication in terms of corporate financial reporting systems, which led to the emergence of a new type of reporting (financial reporting in real time). where is the information and communications technology mainstay Nations for the development and progress, thanks to the development of technology that have made the transmission of information easily conducted and high speed to all who need it, communication is instantaneous and the flow of information via the internet dramatically exceeded the border temporal and spatial anywhere in the w
... Show More