Preferred Language
Articles
/
wRZfQ4cBVTCNdQwCUj7b
Surface Characterization of PEKK Modified by stron-tium –hydroxyapatite coating as implant material Via the magnetron sputtering Deposition technique
...Show More Authors

Background: The best material for dental implants is polyetherketoneketone (PEKK). However, this substance is neither osteoinductive nor osteoconductive, preventing direct bone apposition. Modifying the PEKK with bioactive elements like strontium hydroxyapatite is one method to overcome this (Sr-HA). Due to the technique's capacity to provide better control over the coating's properties, RF magnetron sputtering has been found to be a particularly useful technique for deposition. Materials and methods : With specific sputtering conditions, the RF magnetron technique was employed to provide a homogeneous and thin coating on Polyetherketoneketone substrates.. the coatings were characterized by Contact angle, adhesion test, X-ray diffraction (XRD), atomic force microscope and Elemental Analysis with Energy Dispersive X-Ray (EDX) Results : indicated that strontium hydroxyapatite had successfully deposited onto the surface with significant improvement in the wettability value to provide a suitable environment for cell attachment, spreading, proliferation, and differentiation Conclusion: Coating PEKK with RF magnetron sputtering can provide homogeneous surfaces laying the groundwork for improving PEKK's potential bioactivity, such as surface wettability. Wetting qualities are critical in implantable materials and are used to predict future osseointegration success.

Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Development and Implementation a Programmable Model for Evaluation Pumping Technique
...Show More Authors

This work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Enhancing Stud Arc Welding Technique Vai Utilizing FuzzyLogic Approach (FLA)
...Show More Authors

A fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (18)
Crossref (5)
Scopus Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimator a Smoothing Technique for Estimating Regression Function
...Show More Authors

    The using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible models of parametric models and these models were nonparametric models.

    In this manuscript were compared to the so-called Nadaraya-Watson estimator in two cases (use of fixed bandwidth and variable) through simulation with different models and samples sizes.  Through simulation experiments and the results showed that for the first and second models preferred NW with fixed bandwidth fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
A reliable numerical simulation technique for solving COVID-19 model
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Drugs In Dermatology: Jdd
Melanocytes transplantation in patients with vitiligo using needling micrografting technique.
...Show More Authors

KE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Drugs in Dermatology: JDD, 2013 - Cited by 22

View Publication
Publication Date
Thu Aug 08 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Novel Technique for Alveolar Ridge Expansion: A Comparative Clinical Study
...Show More Authors

Background: Piezosurgery improved the split approach by making it safer, easier, and less prone to complications when treating extremely atrophic crests. Densah drills, with their unique design, expand the ridge by densifying bone in a reverse, non-cutting mode. Objective: To assess the effectiveness of sagittal piezosurgery, which involves cutting bone to the full implant depth and then expanding it using osseodensification drills. We use this technique to expand narrow alveolar bones and simultaneously place dental implants in the maxillary and mandibular arches. Methods: Fourteen patients received 31 dental implants. The maxillary arch received 19, and the mandible received 12 dental implants. This study will include patients who

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science &amp; Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2025
Journal Name
International Journal Of Applied Sciences And Technology
VEGETATION COVER MONITORING IN MOSUL CITY USING REMOTE SENSING TECHNIQUE
...Show More Authors

This study aims to identify changes in vegetation cover and its impact on the climate of Mosul City. The analytical method of the study relies on changes in Land Use/Land Cover (LULC), Normalized Difference Vegetation Index (NDVI), and Land Surface Temperature (LST); GIS technology was used to measure these statistics. Landsat (5,8) imagery was used to detect the change in vegetation cover change and land surface temperature during the study period from 2010 to 2022, where the unsupervised classification technique was used to determine LU variations. The results revealed significant changes among the LU classes during the study period, primarily due to human activities. The most prominent change in LU was the urban expansion of agricultural

... Show More
View Publication Preview PDF