Background: Tooth eruption is a localized process in the jaws which exhibits precise timing and bilateral symmetry. Develop within the jaws and their eruption is a complex infancy process during which they move through bone to their functional positions within the oral cavity. For species with more than one set of teeth, eruption of the second set also accomplishes. The key to the successful clinical management of tooth eruption consists of understanding that this process consists largely of the local regulation of alveolar bone metabolism to produce bone resorption in the direction of eruption and shift and formation of bone at the opposite side.The amniotic sac contains a considerable quantity of stem cells. These amniotic stem cells are able to differentiate into various tissues, which used in many field. Vascular endothelial growth factor (VEGF) is an important angiogenic factor reported to induce migration and proliferation of endothelial cells, enhance vascular permeability, and modulate thrombogenicity. VEGF expression in cultured cells (smooth muscle cells, macrophages, endothelial cells) is controlled by growth factors and cytokines. The aim of this study was to study the administration of cell molecules of (Chorion, Amnion and Amniotic fluid) around developing mouse tooth and studying the expression of VEGF marker. Materials and Methods: forty eight albino Swiss mice of one day old age injected with isolated amniotic stem cells in the anterior region of maxilla (incisors area) other 16 mice injected with saline represents control. Sacrifice 4 mice for each period (4, 7, 10, and 13) day old age. The result were studied histologically and immunohistochemistry. Results: VEGF marker localized and identified in 3 areas; pulp, P.D.L, and Bone. In pulp. The mean value of positive VEGF expression showed to be highest in Amnion group in comparison to the other studied groups. The marginal mean value of all periods reported to be highest in Amnion groups followed by Chorion group. The period 10 day showed highest marginal means value for positive VEGF expression for all groups. In P.D.L. area Amniotic fluid records the highest mean and marginal mean value specifically at day-10 in comparison to other studied groups. In Bone area Amniotic fluid records the highest mean and marginal mean value among the studied groups followed by Chorion group. Period 7-day and 10-day shows high mean value for VEGF expression. Coincidence test for VEGF marker illustrates to be affected by Amniotic fluid application in P.D.L. and in bone area while Amnion and Chorion application showed to be concerned with pulp. Conclusion. It reported that amniotic fluid application affected on expression of VEGF in P.D.L and bone while amnion and chorion showed to affect on expression of VEGF in pulp.The present study highlighted on clinical and researcher application of Amniotic fluid and Chorion for supplement of stem cell in dental tissue engineering or even in other body tissues.
Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreAbstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreIn this paper, we implement and examine a Simulink model with electroencephalography (EEG) to control many actuators based on brain waves. This will be in great demand since it will be useful for certain individuals who are unable to access some control units that need direct contact with humans. In the beginning, ten volunteers of a wide range of (20-66) participated in this study, and the statistical measurements were first calculated for all eight channels. Then the number of channels was reduced by half according to the activation of brain regions within the utilized protocol and the processing time also decreased. Consequently, four of the participants (three males and one female) were chosen to examine the Simulink model during di
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreMedical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform w
... Show More