In this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.
This study applies a discourse analysis framework to explore the portrayal of women in Maysloon Hadi’s novel (The Black Eyes) (2011), using Critical Discourse Analysis (CDA) and Norman Fairclough’s tri-dimensional model (1989) as the analytical foundation. It investigates the roles and challenges women face in the novel. While there is growing interest in the portrayal of women in literature, Iraqi literature—especially from the perspective of Iraqi women writers remains underexplored. Hadi’s *The Black Eyes* provides a unique case to examine this intersection. Despite the novel’s rich narrative, which offers insight into Iraqi women’s lives, there is a lack of comprehensive CDA to understand how its language constructs
... Show MoreThis study aims at describing the identity crisis of Diaspora people (Arab -American) in "Laila Halaby's" novel "Once in A promise Land". Halaby tackles the issues of racism, exclusion, and instability of identity that affect the Arab American community after the terrorist event of eleventh of September. She sheds light on the experiences of her significant characters Salwa and Jassim in America, clarifying how this event weakened their social position and turns their presence in America questionable. "Halaby" describes the bitterness of her characters who are induced into a dream of belonging to a land that transcends their original culture and religious values as well as their language. "Halaby" explains the subsistence in America involvi
... Show MoreThe influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr
... Show MoreVitamins play an important role in the human health, and thus they are the kind of major nutrients in the body. Chemical products perform numerous physiological functions and can jeopardize health jointly in their absence and surplus. Therefore, it is necessary to establish methods for observation vitamin levels in various molds. In this review paper, the most methods of determination used are high performance liquid chromatography (HPLC), spectrophotometric and potentiometric techniques by listed the value of : slope, linear range, correlation coefficient, detection limit, the max of wavelength and PH and compared with these methods.
Purpose A diagnosis of tuberculosis (TB) of the head and neck has been a dilemma for clinicians, because the clinical and pathologic features tend to mimic different pathologies. Our study aimed to identify the demographic, clinical, and pathologic features of head and neck TB to help healthcare providers in the early detection of the disease. Materials and Methods We performed a retrospective analysis using the medical archives at the pathology laboratory. Twenty-one patients with a clinical and pathologic diagnosis of head and neck TB were identified from 2010 to 2019. Results The age distribution was broad, with 28.5% of the patients younger than 15 years old. Seven patients had oral TB, with the most common sites affected the labial ves
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreE-learning applications according to the levels of enlightenment (STEM Literacy) for physics teachers in the secondary stage. The sample consists of (400) teachers, at a rate of (200) males (50%), and (200)females (50%), distributed over (6) directorates of education in Baghdad governorate on both sides of Rusafa and Karkh. To verify the research goals, the researcher built a scale of e-learning applications according to the levels of STEM Literacy, which consists of (50) items distributed over (5) levels. The face validity of the scale and its stability were verified by extracting the stability coefficient through the internal consistency method “Alf-Cronbach”. The following statistical means were used: Pearson correlation coefficient,
... Show MorePurpose: We report a series of 29 pediatric patients who sustained head injuries due to metallic ceiling fans. They all were admitted to the Emergency Department of Neurosurgery Teaching Hospital in Baghdad, Iraq, during January 2015 to January 2017. Results: Pediatric ceiling fan head injuries are characterized by four traits which distinguish them from other types of head injuries; 1- Most of them were because of climbing on or jumping from furniture between the ages of two and five. 2- Most of them sustained compound depressed skull fracture which associated with intracranial lesions and pneumocephalus. 3- The most common indication for surgical intervention was because of dirty wound which mixed with hairs. 4- These variables were stati
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More