Preferred Language
Articles
/
whfCY5IBVTCNdQwCTK54
Particles-based Medicated Wound Dressings: A Comprehensive Review
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Sylwan Journal
Histological Evaluation and Gene Expression of Local Application of Calmodulin on Wound Healing of rats
...Show More Authors

Background and Objectives: Wound healing is a complex process with overlapping phases haemostasis, inflammation, proliferation and maturation/matrix remodeling. Each phase of wound healing requires different management strategies, and inappropriate treatment can delay wound healing. The aim of the present study was to evaluate the efficacy of topical application of calmodulin as a significant augmentation of the granulation tissue production process of wound healing and to express of genes CaMKK2, MaP2K6 and CXCR4 at site of wound defect, that have versatile effects on the body and they belong to Ca/camodulin related genes. Material and Methods: In this study thirty albino male rats, weighting (300-400) gram, aged (6-8) months, wil

... Show More
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the effect of local exogenous application of osteopontin on wound healing in rats
...Show More Authors

Background: Wound healing is a complex dynamical interaction between various cell types, the extracellular matrix, cytokines, and growth factors. osteoponetin is a substance that acts as an anti-inflammatory. Aims of study: The study was designed to identify the role of local exogenous applications of osteopontin on wound healing (in cheek skin). Materials and methods: Thirty adult male albino rats weighting an average of (250-300gm) used in this study, incisional wounds were made in the skin of the cheek of rat and they were divided into the following groups: A-Control group: 15 rats treated with 1µ l of normal saline B-Experimental groups: 15 rats treated with topical application of 1µl osteopontin. The scarification of animals we

... Show More
View Publication
Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Bacterial Isolates and Their Antibiograms of Burn Wound Infections in Burns Specialist Hospital in Baghdad
...Show More Authors

A total of 54 out of 67 (80.59%) of burn wound swab showed growth of one, or two, or three bacterial pathogens. Pseudomonas aeruginosa was the commonest pathogen, isolated in 48.14% of swab samples, followed by Klebsiella pneumoniae (31.48%), Staphylococcus aureus (27.77%), Acinetobacter baumanii (14.81%), Escherichia coli (7.40%), and Citrobacter freundii, Providencia stuartii, Enterobacter cloacae, with 1.85% isolation percentage for each. All bacterial isolates were tested against 19 antibiotics, and showed multi-drug resistance to 10 antibiotics, or more. The most effective antibiotics were the fifth-generation cephalosporin, ceftobiprole, and and antibiotic combinations, as Ceftazidime / clavulanic acid, and Cefoperazone /sulbactam, an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Electric Power Systems Research
Electromagnetic transient modeling of form-wound stator coils with stress grading system under PWM excitation
...Show More Authors

The insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the

... Show More
Crossref (5)
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Surgical Neurology International
Brown-Sequard syndrome associated with a spinal cord injury caused by a retained screwdriver: A case report and literature review
...Show More Authors
Background:

Nonmissile penetrating spine injury (NMPSI) represents a small percent of spinal cord injuries (SCIs), estimated at 0.8% in Western countries. Regarding the causes, an NMPSI injury caused by a screwdriver is rare. This study reports a case of a retained double-headed screwdriver in a 37-year-old man who sustained a stab injury to the back of the neck, leaving the patient with a C4 Brown-Sequard syndrome (BSS). We discuss the intricacies of the surgical management of such cases with a literature review.

Methods:

PubMed database was searched by the following combined formula of medical subjects headings,

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Wed Mar 20 2019
Journal Name
Journal Of Legal Sciences
Sale Based on an Open Price – A Comparative Study
...Show More Authors

The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the

... Show More
View Publication
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Fri Sep 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Graph-Based Text Representation: A Survey of Current Approaches
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref