Preferred Language
Articles
/
1xjsfpUBVTCNdQwCNy62
Microleakage Evaluation of a Silorane-Based and Methacrylate-Based Packable and Nanofill Posterior Composites (in vitro comparative study)
...Show More Authors

This study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were then thermocycled, immersed in 1% methylene blue dye for 24 hours at room temperature, embedded in auto-polymerizing acrylic resin and sectioned longitudinally bucco-lingually. Microleakage was evaluated by assessing the linear dye penetration at the tooth/restoration interface occlusally and gingivally. The highest microleakage score occlusally or gingivally was recorded and the results were analyzed statistically using SPSS version 13. The results of this study showed that the silorane-based posterior composite Filtek™ P90 showed significantly less microleakage than the methacrylate-based packable composite (Filtek™ P60) and the nano-filled composite (Filtek™ Supreme XT) when the tooth-restoration interface is located in enamel.

Preview PDF
Quick Preview PDF
Publication Date
Sun May 04 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Shear bond strength of different lingual buttons bonded to wet and dry enamel surfaces with resin modified glass ionomer cement (in vitro comparative study)
...Show More Authors

Background: This study was aimed to investigate the effect of three lingual button (Nickel free / rectangular base, Nickel free / round base and Composite) and bonding environment, wet and dry enamel surface, on: the shear bond strength (SBS) of light and self-cured Resin Modified Glass Ionomer Cements, and the debonding failure sites. Materials and method: One hundred twenty no-carious, free of cracks maxillary first premolar teeth were selected. Three types of orthodontic lingual buttons were used in this study: Nickel free / rectangular base, Nickel free / round base and Composite buttons. The teeth were divided into two groups of sixty teeth each. One group was used for testing the chemically cured GC Fuji Ortho Resin modified Glass Io

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Formation Evaluation for Nasiriyah Oil Field Based on The Non-Conventional Techniques
...Show More Authors

The unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:

  • Apparent resistivity Rwa
  • Rxo /Rt

   The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 21 2022
Journal Name
Iraqi Journal For Computer Science And Mathematics
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Applied Thermal Engineering
Consecutive charging and discharging of a PCM-based plate heat exchanger with zigzag configuration
...Show More Authors

View Publication
Scopus (62)
Crossref (56)
Scopus Clarivate Crossref
Publication Date
Sun May 04 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of Olive Oil as a Separating Medium and Its Effect on Some Mechanical Properties of Processed Acrylic Resin Denture Base (A Comparative Study). Part Two
...Show More Authors

Background: During acrylic resin processing, the mold must be separated from the surface of the gypsum to prevent liquid resin from penetrating into the gypsum, and water from the gypsum seeping into the acrylic resin. For many years, tin foil was the most acceptable separating medium, and because it's difficult to apply, a tin-foil substitute is used. In this study, olive oil is used as an alternative to tin foil separating medium for first time, and evaluating its effect as a separating medium on some mechanical properties such as (indentation hardness and transverse strength) of acrylic resins denture base comparing it with those processed using tin-foil and tin foil substitute such as (cold mold seal) separating medium. Materials and M

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 18 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Preparation and In-Vitro Evaluation of Floating Oral In- Situ Gel of Montelukast Sodium (Conference Paper) #
...Show More Authors

Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref