Background and aim: Pomegranate is a medicinal herb that can promote healing of periodontal tissue through differentiation of mesenchymal cells both in vivo and in vitro. Therefore, this study is to investigate the effect of oral supplementation of Punicagranatum L. peel extract on bone defect in rabbit. Methods: Forty five male rabbits were divided into 3 groups; group 1; baseline group(5 rabbits) left without bone defect. Group 2; study group (20 rabbits) with bone defect model that received daily 1ml of oral supplementation of pomegranate peel extract (PoPx). Group 3; control group (20 rabbits) with bone defect model that received distilled water. Bone defect was done into facial plate of lower right central incisor. Blood biopsies by cardiocentesis at times (base line, 3h, 1, 3 and 7days) for estimation of serum calcium, phosphorous, and vitamin D levels. Results: The results showed a significant increase in serum calcium and phosphorous levels only after 3 hours and 1 day of bone defect, in rabbits receiving water and rabbits receiving pomegranate peel extraction. Serum vitamin D level shows significant increase in all time intervals reaching maximum value after three days in rabbits receiving pomegranate peel extract, while no significant change was observed in rabbits receiving water. Conclusions: Supplementation of pomegranate peel extract can increase vitamin D absorption, thus it may promote the bone healing process.
Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. M
... Show MoreThere is a great operational risk to control the day-to-day management in water treatment plants, so water companies are looking for solutions to predict how the treatment processes may be improved due to the increased pressure to remain competitive. This study focused on the mathematical modeling of water treatment processes with the primary motivation to provide tools that can be used to predict the performance of the treatment to enable better control of uncertainty and risk. This research included choosing the most important variables affecting quality standards using the correlation test. According to this test, it was found that the important parameters of raw water: Total Hardn
In this study, an improved process was proposed for the synthesis of structure-controlled Cu2O nanoparticles, using a simplified wet chemical method at room temperature. A chemical solution route was established to synthesize Cu2O crystals with various sizes and morphologies. The structure, morphology, and optical properties of Cu2O nanoparticles were analyzed by X-ray diffraction, SEM (scanning electron microscope), and UV-Vis spectroscopy. By adjusting the aqueous mixture solutions of NaOH and NH2OH•HCl, the synthesis of Cu2O crystals with different morphology and size could be realized. Strangely, it was found that the change in the ratio of de-ionized water and NaOH aqueous solution led to the synthesis of Cu2O crystals of differen
... Show MoreDeep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d
... Show MoreRainwater harvesting could be a possible solution to decrease the consequences of water scarcity and energy deficiency in Iraq and the Kurdistan Region of Iraq (KRI). This study aims to calculate the water and energy (electricity) saved by rainwater harvesting for rooftops and green areas in Sulaimani city, KR, Iraq. Various data were acquired from different formal entities in Sulaimani city. Moreover, Google Earth and ArcMap 10.4 software were used for digitizing and calculating the total rooftop and green areas. The results showed that for the used runoff coefficients (0.8 and 0.95), the harvested rainwater volumes were 2901563 and 12197131 m³ during the study period (2005 – 2006) and (2019-2020). Moreover, by compa
... Show MoreTechnique was used to retail for analyzing atom beryllium ion cathode of an atom lithium to six pairs of functions wave which two ?????? and the rest of the casing moderation and to analyze atom lithium ion Mob atom beryllium to three pairs of functions wave pair of casing and the rest of the casing moderation using function wave Hartree Fock and each casing email wascalculate expected values ??....
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Praise be to Allah. Praise be to Him. We seek refuge in Him. We seek forgiveness from him. We seek forgiveness from him.
And the disadvantages of our actions, of his hands
e
It is important, if not all, to pay tribute to God
Muhammad Abdo and Rasoulou, there is no way to deprive the nation of the weakness of God alone and not to share it
Which suffer from the Quran, and the loss of its borders, bad
The work did not work and did not improve
Do what they offer and delay the others, except by reference to this Koran and the extraction of treasures and secrets
And news.
The Great Quran Study
Lu Imito ordered each poisoned, and achieved several targets of
YEMYA: Knowing the secrets of the Grea
The present work introduces, external morphological study of the leafhopper Neoalitarus
fenestratus Herrich-Schäeffer (Deltocephalinae:Oposiini), particularly the male genitalia
which were dissected and illustrated.