Platelet‐rich fibrin (PRF) has been widely used in regenerative dentistry due to many growth factors produced. Periostin, a matricellular protein, is a reliable marker for tissue regeneration. Periostin is part of the cellular matrix and regulates bone homeostasis. This study aims to explore the efficacy of PRF in improvement of the clinical periodontal parameters as an adjunct to the scaling and root planing and to evaluate periostin level in gingival crevicular fluid (GCF) at baseline, 1‐ and 3‐month recall visits. Fourteen periodontitis patients who met the inclusion criteria were recruited in this study. Two contralateral periodontal pockets with 4–6 mm in depth in each patient were selected. The sites in every participant were randomly allocated into control sites or test sites. In control sites, only conventional scaling and root planing was carried out. In test sites, however, scaling and root planing method and PRF were applied. Periostin level in GCF and clinical periodontal parameters were measured. The test sites revealed greater relative attachment gain (2.614 ± 0.606 mm and 3.321 ± 0.668 mm) than control sites (1.285 ± 0.671 mm and 1.839 ± 0.632 mm) and a significant pocket reduction (2.535 ± 0.664 mm and 3.321 ± 0.668 mm) than the control sites (1.21 ± 0.508 mm and 1.892 ± 0.655 mm) at 1‐ and 3‐month recall visits respectively. In the test sites, level of periostin (48.83 ± 9.3 ng/μl and 98.90 ± 24.94 ng/μl) were greater than periostin levels in the control sites (42.65 ± 7.03 ng/μl and 49.29 ± 15.14 ng/μl) at 1‐ and 3‐month recall visits respectively. In conclusion, the non‐surgical application of PRF as an adjunct to scaling and root planing significantly improved the clinical periodontal parameters through raising periostin level in GCF.
The research acquires its importance by motivating the behavioural side of the employees to apply modern technology in the work, because of its great importance in increasing the efficiency of employees’ performance and excellence. The research was based on two main hypotheses to show the relationship and impact between the variables through the adoption of a questionnaire to collect data and information related to the research, which consisted of (50) people from administrators working at different levels, based on personal interviews and field visits to collect research data. The data collection process was subjected to statistical analysis using the statistical program (SPSS) (Statistical package for social science) to reach
... Show MoreAnodic electrodeposition was used to synthesize a composite electrode of nanostructured manganese dioxide/carbon fiber (CF) galvanostatically. Different characterization results of the nanostructured MnO2 were obtained by varying the H2SO4 concentration and the current density. Field emission scanning electron microscopy, X‐ray diffraction, and atomic force microscopy were utilized to characterize the prepared composite electrodes. The best conditions were: 0.3 mA cm−2 current density and 0.64 M H2SO4 concentration. The electrosorption performance of the MnO
The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreThe purpose of this paper is applying the robustness in Linear programming(LP) to get rid of uncertainty problem in constraint parameters, and find the robust optimal solution, to maximize the profits of the general productive company of vegetable oils for the year 2019, through the modify on a mathematical model of linear programming when some parameters of the model have uncertain values, and being processed it using robust counterpart of linear programming to get robust results from the random changes that happen in uncertain values of the problem, assuming these values belong to the uncertainty set and selecting the values that cause the worst results and to depend buil
... Show MoreRecently, it has been revealed that Toxoplasmosis may be associated with some factors related to type 2 diabetes, such as glucose, insulin, the Homeostatic Model Assessment for Insulin Resistant (HOMA-IR), and Fatty acid binding protein (FABP). Therefore, the current study aimed to specify how Toxoplasma gondii (T.gondii) infection affects glucose, insulin, HOMA-IR, and FABP among adolescents. From October to December 2022, this study was carried out at Al Madain Hospital in Baghdad. For a group of adolescents visiting the hospital, an ELISA test was performed to check their anti-T.gondii antibodies. Ninety adolescents were selected to participate in the study on the basis of this examination. They were divided into two groups: those who te
... Show MoreImage recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third
... Show MoreLe professeur Taranne et La non-Communication
Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence