Preferred Language
Articles
/
jbcd-233
Enhancement of tooth eruption by using amniotic stem cells (Immunohistochemical study of VEGF marker)
...Show More Authors

Background: Tooth eruption is a localized process in the jaws which exhibits precise timing and bilateral symmetry. Develop within the jaws and their eruption is a complex infancy process during which they move through bone to their functional positions within the oral cavity. For species with more than one set of teeth, eruption of the second set also accomplishes. The key to the successful clinical management of tooth eruption consists of understanding that this process consists largely of the local regulation of alveolar bone metabolism to produce bone resorption in the direction of eruption and shift and formation of bone at the opposite side.The amniotic sac contains a considerable quantity of stem cells. These amniotic stem cells are able to differentiate into various tissues, which used in many field. Vascular endothelial growth factor (VEGF) is an important angiogenic factor reported to induce migration and proliferation of endothelial cells, enhance vascular permeability, and modulate thrombogenicity. VEGF expression in cultured cells (smooth muscle cells, macrophages, endothelial cells) is controlled by growth factors and cytokines. The aim of this study was to study the administration of cell molecules of (Chorion, Amnion and Amniotic fluid) around developing mouse tooth and studying the expression of VEGF marker. Materials and Methods: forty eight albino Swiss mice of one day old age injected with isolated amniotic stem cells in the anterior region of maxilla (incisors area) other 16 mice injected with saline represents control. Sacrifice 4 mice for each period (4, 7, 10, and 13) day old age. The result were studied histologically and immunohistochemistry. Results: VEGF marker localized and identified in 3 areas; pulp, P.D.L, and Bone. In pulp. The mean value of positive VEGF expression showed to be highest in Amnion group in comparison to the other studied groups. The marginal mean value of all periods reported to be highest in Amnion groups followed by Chorion group. The period 10 day showed highest marginal means value for positive VEGF expression for all groups. In P.D.L. area Amniotic fluid records the highest mean and marginal mean value specifically at day-10 in comparison to other studied groups. In Bone area Amniotic fluid records the highest mean and marginal mean value among the studied groups followed by Chorion group. Period 7-day and 10-day shows high mean value for VEGF expression. Coincidence test for VEGF marker illustrates to be affected by Amniotic fluid application in P.D.L. and in bone area while Amnion and Chorion application showed to be concerned with pulp. Conclusion. It reported that amniotic fluid application affected on expression of VEGF in P.D.L and bone while amnion and chorion showed to affect on expression of VEGF in pulp.The present study highlighted on clinical and researcher application of Amniotic fluid and Chorion for supplement of stem cell in dental tissue engineering or even in other body tissues.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Plant Archives
Schistosomiasis vector control using cucumis melo plantextractswithbioassayexperiment
...Show More Authors

he aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail

... Show More
View Publication
Scopus
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Object Filling Using Table Based Boundary Tracking
...Show More Authors

The feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 07 2017
Journal Name
The First International Conference For Engineering Research
Colony Counting Using iPad and iPhone Applications
...Show More Authors

Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Data Mining, Modelling And Management
Association rules mining using cuckoo search algorithm
...Show More Authors

Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.

View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression using Hierarchal Linear Polynomial Coding
...Show More Authors

Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Human Recognition Using Ear Features: A Review
...Show More Authors

Over the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time.  In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D

... Show More
View Publication
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref