Background: Bone defect healing is a multidimensional procedure with an overlapping timeline that involves the regeneration of bone tissue. Due to bone's ability to regenerate, the vast majority of bone abnormalities can be restored intuitively under the right physiological conditions. The goal of this study is to examine the immunohistochemistry of bone sialoprotein in order to determine the effect of local application of bone sialoprotein on the healing of a rat tibia generated bone defect. Materials and Methods: In this experiment, 48 albino male rats weighing 300-400 grams and aged 6-8 months will be employed under controlled temperature, drinking, and food consumption settings. The animals will be subjected to a surgical procedure on the medial side of the tibiae bone, with the bone defect repaired with absorbable hemostatic material in the control group (12 rats). The experimental group (12 rats) will be treated with local administration of 30 μl bone sialoprotein fixed by absorbable hemostatic sponge. After surgery, the rats will be slaughtered at 7, 14, and 28 days (four rats for each period). Results: Immunohistochemical analysis of bone sialoprotein by stromal cells reveal a substantial difference between the bone sialoprotein group and the control group. Conclusion: The study concludes that local application of bone sialoprotein could be a successful therapeutic treatment for bone injuries; these findings are encouraging for future clinical use.
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThe research aims to apply one of the techniques of management accounting, which is the technique of the quality function deployment on the men's leather shoe product Model (79043) in the General Company for Textile and Leather Industries by determining the basic requirements of the customer and then designing the characteristics and specifications of the product according to the preferences of the customer in order to respond to the customer's voice in agreement With the characteristics and technical characteristics of the product, taking into account the products of the competing companies to achieve the maximum customer satisfaction, the highest quality and the lowest costs. Hence, the importance of research has emerged, which indicat
... Show MoreThe yellow scale insect
Turbidity is a visual property of water that expresses the amount of suspended substances in the water. Its presence in quantities more significant than the permissible limit makes the water undrinkable and reduces the effectiveness of disinfectants in treating pathogens. On this basis, turbidity is used as a basic indicator for measuring water quality. This study aims to evaluate the removal efficiency of AL- Muthanna WTP. Water turbidity was used as a basic parameter in the evaluation, using performance improvement evaluation and data from previous years (2016 to 2020). The average raw water turbidity was 26.7 NTU, with a minimum of 14 NTU, with a maximum of 48 NTU. Water turbidity value for 95% of settling daily reading data was
... Show MoreThis study aims to encapsulate atenolol within floating alginate-ethylcellulose beads as an oral controlled-release delivery system using aqueous colloidal polymer dispersion (ACPD) method.To optimize drug entrapment efficiency and dissolution behavior of the prepared beads, different parameters of drug: polymer ratio, polymer mixture ratio, and gelling agent concentration were involved.The prepared beads were investigated with respect to their buoyancy, encapsulation efficiency, and dissolution behavior in the media: 0.1 N HCl (pH 1.2), acetate buffer (pH 4.6) and phosphate buffer (pH 6.8). The release kinetics and mechanism of the drug from the prepared beads was investigated.All prepare
... Show More