A cumulative review with a systematic approach aimed to provide a comparison of studies’ investigating the possible impact of the active form of vitamin D3, calcitriol (CTL), on the tooth movement caused by orthodontic forces (OTM) by evaluating the quality of evidence, based on collating current data from animal model studies, in vivo cell culture studies, and human clinical trials. Methods: A strict systematic review protocol was applied following the application of the International Prospective Register of Systematic Reviews (PROSPERO). A structured search strategy, including main keywords, was defined during detailed search with the application of electronic database systems: Medline/Pubmed, EMBASE, Scopus, Web of Science, and PsycINFO. In addition, a search was carried out with the use of ClinicalTrials.gov search in order to include ongoing or recently completed trials. The Oxford Level of Evidence and the Grading of Recommendations Assessment, Development, and Evaluation (GRADE) approach was utilized to critically evaluate the risk of bias and relative quality of studies included. Meta-analysis with the use of RevMan5 software, random effect, and inverted variable method allowed the quantification of cumulative results. Results: Twenty-seven studies were identified which fulfilled inclusion criteria, including two clinical studies. The assessed level of evidence was variable and inconsistent, predominantly being moderate or low due to a significant difference in study design, sample size, and study protocols. Data synthesis rendered from meta-analysis involving various CTL doses demonstrated slight discrepancies in tooth movement between control and experimental groups (mean difference = 0.27; 95% CI: 0.01–0.53, std mean difference = 0.49; 95% CI: 0.09–0.89), as well as relatively moderate heterogenicity. Conclusions: Although it has been suggested that CTL could accelerate OTM in animal studies and clinical context, these scarce data were supported by a low level of evidence and the studies were carried out using inadequate sample size. Well-powered RCT studies would help to overcome the lack of robustness of the research.
Background: The evaluation of the chronological age is a practical method in crime investigation field that assists in identifying individuals to treat them as underage or adult. This study aimed to assess the stages of third molars mineralization in relation to chronological age of Iraqi individuals, determine the gender differences and arches (maxillary/mandibular) differences.
Materials and Methods: A total of 300 orthopantomograms of orthodontic patients were collected according to specific criteria and evaluated visually. The developmental stages of maxillary and mandibular third molars were determined according to Demirjian method. T
... Show MoreThe research stems from its goal of identifying the impact of visual management on the strategic acceleration of business organizations and the state of this effect through the knowledge embedding in the Iraqi oil companies. The oil sector was tested, represented by (3) oil companies, and a sample of (151) individuals who participated in activating the visual management, distributed in higher management levels. The research relied on the descriptiveanalytical approach and the questionnaire was a main tool for collecting data and information. The results showed that visual management positively affects strategic acceleration. Moreover, This effect is amplified by the mediating role played by Embedding Knowledge.
Background: This study was conducted to assess the effects of various beverages on the shear bond strength of light-cured orthodontic composite used to bond stainless steel orthodontic brackets on human teeth and to determine the site of bonding failure of this material. Materials and Methods: Fifty extracted human premolars were selected and randomly divided into five equal groups each with 10 teeth according to the beverage type (Control, One Tiger, Milk, Green tea and Coffee). After bonding, the teeth were immersed in specific beverages for 5 minutes twice daily with equal intervening intervals then washed and stored in distilled water at 37º C for the reminder of the day. The process was carried out for 30 days. The samples were then
... Show MoreABSTRACT Background: This study measured the effects of three parameters pH value, length of immersion and type of archwire on metal ions released from orthodontic appliances. Materials and Methods: Ninety maxillary halves simulated fixed orthodontic appliances that were immersed in artificial saliva of different pH values (6.75, 5 and 3.5) during 28 day period. Three types of archwires were used: stainless steel, nickel titanium and thermal activated nickel titanium. The quantity of nickel and chromium ions was determined with the use of atomic force spectrophotometer while iron ions by spectrophotometer. Each orthodontic set was weighted two times, before the ligation and immersion in the artificial saliva and after 28 days at the end of
... Show MoreThe purpose of this paper is to recognize the impact of database levels on fields of banking service (provision of remittance services and transfer of funds, save financial deposits, provision of personal loans services) in some of Iraqi banks using one-way multivariate analysis of variance. The paper population consisted of (120) employees, then a random stratified sample of (104) employees was taken. A questionnaire paper consists of (24) items were designed in order to analyze by one-Way multivariate analysis of variance (MANOVA) using SPSS.One of the main findings of the current paper is that there is an impact of database on fields of banking service in Iraqi banks (Al Rafidain and Al Rasheed).
Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More