Preferred Language
Articles
/
8RZlZIoBVTCNdQwCEJxt
Bio-hybrid dental implants prepared using stem cells with β-TCP-coated titanium and zirconia
...Show More Authors

Purpose This study investigated periodontal ligament (PDL) restoration in osseointegrated implants using stem cells. Methods Commercial pure titanium and zirconium oxide (zirconia) were coated with beta-tricalcium phosphate (β-TCP) using a long-pulse Nd:YAG laser (1,064 nm). Isolated bone marrow mesenchymal cells (BMMSCs) from rabbit tibia and femur, isolated PDL stem cells (PDLSCs) from the lower right incisor, and co-cultured BMMSCs and PDLSCs were tested for periostin markers using an immunofluorescent assay. Implants with 3D-engineered tissue were implanted into the lower right central incisors after extraction from rabbits. Forty implants (Ti or zirconia) were subdivided according to the duration of implantation (healing period: 45 or 90 days). Each subgroup (20 implants) was subdivided into 4 groups (without cells, PDLSC sheets, BMMSC sheets, and co-culture cell sheets). All groups underwent histological testing involving haematoxylin and eosin staining and immunohistochemistry, stereoscopic analysis to measure the PDL width, and field emission scanning electron microscopy (FESEM). The natural lower central incisors were used as controls. Results The BMMSCs co-cultured with PDLSCs generated a well-formed PDL tissue that exhibited positive periostin expression. Histological analysis showed that the implantation of coated (Ti and zirconia) dental implants without a cell sheet resulted in a well-osseointegrated implant at both healing intervals, which was confirmed with FESEM analysis and negative periostin expression. The mesenchymal tissue structured from PDLSCs only or co-cultured (BMMSCs and PDLSCs) could form a natural periodontal tissue with no significant difference between Ti and zirconia implants, consequently forming a biohybrid dental implant. Green fluorescence for periostin was clearly detected around the biohybrid implants after 45 and 90 days. FESEM showed the invasion of PDL-like fibres perpendicular to the cementum of the bio-hybrid implants. Conclusions β-TCP-coated (Ti and zirconia) implants generated periodontal tissue and formed biohybrid implants when mesenchymal-tissue-layered cell sheets were isolated from PDLSCs alone or co-cultured BMMSCs and PDLSCs.

Crossref
View Publication
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Baghdad College Of Dentistry
Apexification and Periapical Healing of Immature Teeth Using Mineral Trioxide Aggregate
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Economics And Administrative Sciences
Using simulation to compare between parametric and nonparametric transfer function model
...Show More Authors

In this paper, The transfer function model in the time series was estimated using different methods, including parametric Represented by the method of the Conditional Likelihood Function, as well as the use of abilities nonparametric are in two methods  local linear regression and cubic smoothing spline method, This research aims to compare those capabilities with the nonlinear transfer function model by using the style of simulation and the study of two models as output variable and one model as input variable in addition t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Extraction of heavy metals from contaminated soils using EDTA and HCl
...Show More Authors

The present study examines the extraction of lead (Pb), cadmium (Cd) and nickel (Ni) from   a contaminated soil by washing process. Ethylenediaminetetraacetic acid disodium salt (Na2EDTA) and hydrochloric acid (HCl) solution were used as extractants.  Soil washing is one of the most suitable in-situ/ ex-situ remediation method in removing heavy metals. Soil was artificially contaminated with 500 mg/kg (Pb , Cd and Ni ).  A set of batch experiments were carried out at different conditions of  extractant concentration , contact time, pH and agitation speed. The results  showed  that the  maximum removal efficiencies  of (Cd, Pb  and Ni ) were (97, 88 and 24 )&nbs

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Estimation of return stock rate by using wavelet and kernel smoothers
...Show More Authors

This article aim to estimate the Return Stock Rate of the private banking sector, with two banks, by adopting a Partial Linear Model based on the Arbitrage Pricing Model (APT) theory, using Wavelet and Kernel Smoothers. The results have proved that the wavelet method is the best. Also, the results of the market portfolio impact and inflation rate have proved an adversely effectiveness on the rate of return, and direct impact of the money supply.

Scopus (3)
Scopus
Publication Date
Sat Jul 28 2018
Journal Name
Journal Of Engineering
Experimental and Numerical Analysis of Expanded Pipe using Rigid Conical Shape
...Show More Authors

The experimental and numerical analysis was performed on pipes suffering large plastic deformation through expanding them using rigid conical shaped mandrels, with three different cone angles (15◦, 25◦, 35◦) and diameters (15, 17, 20) mm. The experimental test for the strain results investigated the expanded areas. A numerical solution of the pipes expansion process was also investigated using the commercial finite element software ANSYS. The strains were measured for each case experimentally by stamping the mesh on the pipe after expanding, then compared with Ansys results. No cracks were generated during the process with the selected angles. It can be concluded that the strain decreased with greater angles of con

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Determinants of using experimental groups and choosing reasons in psychological researches
...Show More Authors

Until The Second Half Of Nineteenth Century  , Psychology Depended On Philosophy In Its Experiences Which Means It Depend On Individuals Feelings Toward Psychological Experiences And Rapid Observation . As For The Scientific Organized Experimentation And Observation By Machines Have Been Used Later   .

The Experimentation Looking For The Cause Of  Phenomena And How Is That Happened   Also Reveal The Causal Relationship Between Among Phenomena . The Experiences In Psychology Field Include In Its Simplest Form Only One Variable ( Effective) Which Is Called Independent Variable As Well As Another Variable ( Affected )   That Called  Dependent Variable .

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Multi – Linear in Multiple Nonparametric Regression , Detection and Treatment Using Simulation
...Show More Authors

             It is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the

... Show More
View Publication Preview PDF
Crossref