Background: Bone regeneration in dehiscence and fenestration defect can be improved with the use of platelet rich fibrin (PRF) that provides a scaffold for new bone regeneration. This study was conducted to assess the effectiveness of PRF as a graft material and membrane in dehiscence and fenestration defects. Materials and Methods: This prospective clinical study included patients who received dental implants that demonstrated peri-implant defects which were augmented using Leukocyte- PRF (L-PRF) or Advanced-PRF (A-PRF). Twenty four weeks postoperatively the defect resolution and the density of regenerated bone were assessed by CBCT and re-entry surgery. The assessment also included measurement of primary and secondary implant stability using Periotest® M, success rate and complication rate of the installed implants. Results: The mean overall intraoperative defect size was 29.44 (± 14.1) mm2, postoperatively it became 2.07 (± 3.6) mm2 with a statistically significant difference (p= < 0.0001). There was no significant difference between L-PRF and A-PRF. Defect resolution ranged from 80% to 100% with a mean of 95.7% (± 6.7%). Defects that showed complete resolution were significantly smaller in size (21.2± 7 mm2) than those that showed partial resolution (44.4± 11 mm2). The overall mean primary stability recorded was 2.9 (± 1.6) Periotest values (PTV) and overall mean secondary stability was -0.22 (±1.4) (P<0.0001).The overall mean HU of the newly formed peri-implant bone was 385.7 (± 77.4). Conclusions: PRF as the sole graft material for peri-implant defects results in complete defect resolution in small to moderate defects, larger defects may require the addition of bone substitute to achieve complete defect resolution.
This study deals with the absence of state control over the whole of the Syrian geography in creating an environment conducive to the emergence of a new force represented by armed groups and organizations that point to fundamental changes in the conflict and to transform competition for control over the land into a struggle for influence. Which in itself represents the prospects of change in the Syrian scene, and that understanding their interests requires shedding light on the extent of the continuation of this competition and the conflict on land and expansion at the expense of the other, and thus contribute to complicate the Syrian scene, especially after attempts to bite Of land and annexation to each party's areas of influence, espe
... Show MoreThis research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using thr
... Show MoreThis research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using three electrodes potentiostat. The corrosion behavior was
... Show MoreThis research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using three electrodes potentiostat. The corrosion behavior
... Show MoreTo study the qualitative changes in testis tissue after carbon tetrachloride (CCl4) administration and to determine whether citric acid (CA) has a protective effect against testis damage induced by CCl4. This study compared two types of CA by measuring the histoarchitecture of the testis and serum levels of progesterone, estrogen and testosterone on mice. One of the most produced organic acid is citric acid. In this study, CA produced by microbial fermentation using Aspergillus Niger 5mg/kg and derived from citrus limon 400mg/kg (lemon). Mice were treated with daily intraperitoneal (i.p.) injection for seven successive days after randomly separated into six groups: (1) control, (2) CCl4 (0.02%), (3) limon citric acid (400 mg/kg), (4) CCl4 (
... Show MoreThe proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.
In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete
... Show MoreAs one type of heating furnaces, the electric heating furnace (EHF) typically suffers from time delay, non-linearity, time-varying parameters, system uncertainties, and harsh en-vironment of the furnace, which significantly deteriorate the temperature control process of the EHF system. In order to achieve accurate and robust temperature tracking performance, an integration of robust state feedback control (RSFC) and a novel sliding mode-based disturbance observer (SMDO) is proposed in this paper, where modeling errors and external disturbances are lumped as a lumped disturbance. To describe the characteristics of the EHF, by using convection laws, an integrated dynamic model is established and identified as an uncertain nonlinear second ord
... Show MoreIn this research, the removal of cadmium (Cd) from simulated wastewater was investigated by using a fixed bed bio-electrochemical reactor. The effects of the main controlling factors on the performance of the removal process such as applied cell voltage, initial Cd concentration, pH of the catholyte, and the mesh number of the cathode were investigated. The results showed that the applied cell voltage had the main impact on the removal efficiency of cadmium where increasing the applied voltage led to higher removal efficiency. Meanwhile increasing the applied voltage was found to be given lower current efficiency and higher energy consumption. No significant effect of initial Cd concentration on the removal efficie
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More