Preferred Language
Articles
/
jbcd-3215
Immunohistochemical evaluation for integrin binding sialoprotein on healing process of intrabony defect treated by bone sialoprotein
...Show More Authors

Background: Bone defect healing is a multidimensional procedure with an overlapping timeline that involves the regeneration of bone tissue. Due to bone's ability to regenerate, the vast majority of bone abnormalities can be restored intuitively under the right physiological conditions. The goal of this study is to examine the immunohistochemistry of bone sialoprotein in order to determine the effect of local application of bone sialoprotein on the healing of a rat tibia generated bone defect. Materials and Methods: In this experiment, 48 albino male rats weighing 300-400 grams and aged 6-8 months will be employed under controlled temperature, drinking, and food consumption settings. The animals will be subjected to a surgical procedure on the medial side of the tibiae bone, with the bone defect repaired with absorbable hemostatic material in the control group (12 rats). The experimental group (12 rats) will be treated with local administration of 30 μl bone sialoprotein fixed by absorbable hemostatic sponge. After surgery, the rats will be  slaughtered at 7, 14, and 28 days (four rats for each period). Results: Immunohistochemical analysis of bone sialoprotein by stromal cells reveal a substantial difference between the bone sialoprotein group and the control group. Conclusion:  The study concludes that local application of bone sialoprotein could be a successful therapeutic treatment for bone injuries; these findings are encouraging for future clinical use.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (319)
Crossref (285)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Tue Sep 01 2015
Journal Name
2015 7th Computer Science And Electronic Engineering Conference (ceec)
An experimental investigation on PCA based on cosine similarity and correlation for text feature dimensionality reduction
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Rationalization of costs by using the tool of the quality function deployment: / applied research in the State Company for Textile and Leather Industries
...Show More Authors

The research aims to apply one of the techniques of management accounting, which is the technique of the quality function deployment on the men's leather shoe product Model (79043) in the General Company for Textile and Leather Industries by determining the basic requirements of the customer and then designing the characteristics and specifications of the product according to the preferences of the customer in order to respond to the customer's voice in agreement With the characteristics and technical characteristics of the product, taking into account the products of the competing companies to achieve the maximum customer satisfaction, the highest quality and the lowest costs. Hence, the importance of research has emerged, which indicat

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Estimation of secondary compounds content of some citrus leaves and their relationship by dietary preference for yellow scale insect Aonidiella. Orientalis (Hemiptera: Diaspididae)
...Show More Authors
Abstract<p>The yellow scale insect <italic>Aonidiella orientalis</italic> is an important pest of citrus trees as it absorbs sap from leaves and fruits, causing leaves to turn yellow and deform fruits and drop them. The results of study showed nutritional preference of the insect over some of studied citrus species, as sour orange was the most preferred, followed by lemon and grapefruit, mandarin and oranges were least preferred, with a rate of 22.3, 13.3, 11.7, 10.8, 3.9, and insect / 2 inch<sup>2</sup>, respectively. while results showed a difference in the content of citrus leaves from the secondary compounds, with highest concentration of phenols and total flavonoids in o</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Performance Evaluation the Turbidity Removal Efficiency of AL-Muthana Water Treatment Plant
...Show More Authors

Turbidity is a visual property of water that expresses the amount of suspended substances in the water. Its presence in quantities more significant than the permissible limit makes the water undrinkable and reduces the effectiveness of disinfectants in treating pathogens. On this basis, turbidity is used as a basic indicator for measuring water quality. This study aims to evaluate the removal efficiency of AL- Muthanna WTP. Water turbidity was used as a basic parameter in the evaluation, using performance improvement evaluation and data from previous years (2016 to 2020). The average raw water turbidity was 26.7 NTU, with a minimum of 14 NTU, with a maximum of 48 NTU. Water turbidity value for 95% of settling daily reading data was

... Show More
Crossref (5)
Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Evaluation of Atenolol Floating Beads as a Controlled Delivery System
...Show More Authors

         This study aims to encapsulate atenolol within floating alginate-ethylcellulose beads as an oral controlled-release delivery system using aqueous colloidal polymer dispersion (ACPD) method.To optimize drug entrapment efficiency and dissolution behavior of the prepared beads, different parameters of drug: polymer ratio, polymer mixture ratio, and gelling agent concentration were involved.The prepared beads were investigated with respect to their buoyancy, encapsulation efficiency, and dissolution behavior in the media: 0.1 N HCl (pH 1.2), acetate buffer (pH 4.6) and phosphate buffer (pH 6.8). The release kinetics and mechanism of the drug from the prepared beads was investigated.All prepare

... Show More
View Publication Preview PDF
Crossref (1)
Crossref