Background: The study was designed to evaluate the effect of local application of exogenous VEGF/collagen I separately and as a combination in socket healing. Sixty male Albino Wistar rats were subjected for a surgical tooth extraction of upper 1st molar of both sides (right side was considered as experimental site, while left be the control one, treated with 1µL of normal saline). The rats were scarified at 3, 7, 14, 28 days post extraction. Socket healing was histologically examined with immunohistochemistochemical localization of ALP&FGF2. Materials and Method: Sixty male Albino Wistar rats were subjected for a surgical tooth extraction of upper 1stmolar of both sides (right side was considered as experimental site, while left be the control one). The animals were divided into following groups according to the applicable of biomaterials. A. Control group the tooth socket treated with 1μL of normal saline B. Experimental group includes • Group I contains (20) rats, the tooth socket treated with 1μL of VEGF • Group II contains (20) rats the tooth socket treated with 1μL of collagen type I • Group III contains (20) rats, the tooth socket treated with 1μL of a combination of VEGF and collagen I. Results: At 28 days all groups show re-epithelization but in different thickness, and with newly bone apposition and with different maturity. For positive cells expressed ALP, VEGF group records a high mean values at 3, 14, 28 days periods and with high differences in comparison to other groups while control group reports a high mean value at 7 days . For positive cells expressed FGF2. Control group illustrates a high record for the mean of positive cells expressed FGF2 at 3,7days periods and with high differences in comparison to other groups, while combination group reports a high mean value at 14 days . Conclusion: Results, high lighted on the effect of local application of VEGF in extracted tooth socket that facilitate epithelization, while combination of (collagen and VEGF) shows a high mineralization zone.
The challenges facing today's multi-customer and this is due to the multiplicity of products and speed in launching new products so search came to reveal the reveal the of the new product classification standards through a relationship (good products, low interest products, useful products and products desired) and the customer emotionally blackmail through deportation (fear, obligation and guilt). dentified the problem of the research in several questions focused on the nature of the relationship between the variables of research, and for that outline supposedly to search it expresses the head of one hypothesis and branched out of which four hypotheses subset, but in order to ensure the validity of the ass
... Show MoreCadmium has been known to be harmful to human healthy , manily Via contaminated drinking water , food supplies , tobacco and industrial pollutant . The aim of this study was to determine the toxicity of new Cadmium (II) complex ( Bis[ 5- ( P- nitrophenyl ) – ? 4 – Phenyl- 1,2,4- triazole -3- dithiocarbamatohydrazide] cadmium (II) Hydra ( 0.5) and compare it with anticancer drug cyclophosphamide ( CP) in female albino mice . This complex causes to several alterations in Enzymatic activity of Glutamate Pyruvate Transaminase (GPT) and Alkaline Phosphatase (ALP ) in three organs after the treatment of mice with different doses of a new cadmium (II) complex ( 0.09 / 0.25ml , 0.18/ 0.5ml and 0.25mg /0.7 ml /30 gm of mous
... Show MoreThe COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system
... Show MoreImage databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin