Preferred Language
Articles
/
9xYEYocBVTCNdQwCCki_
A Questionnaire-Based Survey Assessment of Iraqi Dentists Using Repair Versus Replacement of Defective Composite Restoration
...Show More Authors

Tooth restoration one of the most common procedures in dental practice. The replacement of the entire restoration leads to loss of tooth structure and increase risk of pulp injury; replacement is also time consuming and costly. According to the minimally invasive approach when minimal defects, repair is the better choice than the total replacement of the restoration. This study aims to evaluate repair rating versus replacement treatment procedure for defective composite fillings among Iraqi dentists. Material and methodology: A questionnaire survey were designed and distributed to 184 post-graduate dentists in Iraq. The inquiry pertained general information; including their clinical experience in years, their preference in terms of direct composite restoration, repair or replacement of old restorations, whether they taught the indications for repair, and the selection type of composite for repair. Result of 200 questioner’s disrepute, 184 questionnaires were completed and collected. The data revealed that the respondents with 1-5, 6-15 and16-25 years of experience were 62 (33.7%), 75 (40.8%), and 47(25.5%) of total respondents, respectively. The total 174 dentists (94.6%) prefer using tooth-colored restorations and 10 (5.4%) dislike this approach. Result clearly indicate that most of the dentists choose replacement for any fractured or discolored restorations. The data showed that 59.2% of dentist are not familiar with repair, and 40.8% dentists are familiar. The result revealed that 82.1% the dentists were not trained on repair during their undergraduate study. Generally, they had no ideal standard to replace or repair depending on their clinical experience. Therefore, clear criteria and guidelines for replacing and repairing should be developed and followed in post-graduate courses.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Using the Non- Homogenous Poisson Processes with Queuing Theory in the Emergency Department in Al-Tifel Teaching Central Hospital (Al-Iskan)
...Show More Authors

 

In this paper, the using of Non-Homogenous Poisson Processes, with one of the scientific and practical means in the Operations Research had been carried out, which is the Queuing Theory, as those operations are affected by time in their conduct by one function which has a cyclic behavior, called the (Sinusoidal Function). (Mt / M / S) The model was chosen, and it is Single Queue Length with multiple service Channels, and using the estimating scales (QLs, HOL, HOLr) was carried out in considering the delay occurring to the customer before his entrance to the service, with the comparison of the best of them in the cases of the overload.

Through the experiments

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
Pakistan: The most dangerous terrorist extremism hotbed (a study information, limitations, and factors)
...Show More Authors

   Receipt date:10/27/2021    accepted date:12/15/2021     Publication date:31/12/2021

        Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

The phenomenon of extremist extremism (terrorism) was one of the most prominent issues that took a large space in the twenty-first century, in which cognitive motives were mixed with strategic and ideological motives, leading to the emergence of terrorist extremi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
Directing Techniques to Process the Radio Drama Script ( Khata'a Play as a Sample)
...Show More Authors

     The radio drama is considered to be one of the arts that is discovered after a long period of theater's discovery. Initially , it was the broad framework of the theater's work when radio was broadcasting the shows on the huge theaters. This beginning encouraged many of the radio specialists to correlate plays with radio and make a novice and distinctive type of art. Thus, radio drama made its first step including the following   ( plays, short and long series drama as well as other types of radio arts). Because of the above mentioned , the researcher is stimulating  to study directing techniques to process the radio drama script ( Khata'a play as a sample).

The first chapter deals with the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Journal Of Applied Mathematics
Order and Chaos in a Prey-Predator Model Incorporating Refuge, Disease, and Harvesting
...Show More Authors

In this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
المجلة السياسية والدولية
Foreign Policy and Asymmetric Threats The United States after 2001 as a model
...Show More Authors

يشهد المسرح الدولي قضايا مستجدة ومستحدثة مثل تعدد الفاعلين من الدول ومن غير الدول وتزايد مساحات نفوذهم وتأثيرهم ،ومن جانب اخر أثرت جائحة كورونا على البيئة والمناخ بشكل ملموس على جوانب عدة. فضلا عن ذلك تأثرت جميع المجتمعات البشرية بالإرهاب والهجمات الالكترونية وغيرها ومن بينها دول والمجتمع الدولي بإفراده مؤسسات وكيان اقتصادي وسياسي وقانوني وأمني وامتداد اثاره واسبابه الكثيرة والمتداخلة وما يثيره من خلق حا

... Show More
Preview PDF
Publication Date
Sun Apr 01 2012
Journal Name
American Journal Of Applied Sciences
A New Strategy for Signaling Overhead Reduction in the Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Al Adab Journel
Gender Struggle and Women's Predicament in Tennessee Williams' A Street Car named Desire
...Show More Authors

Abstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit

... Show More
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Women's Rape in Iraq between Legislation and Social Norms: A Critical Discourse Analysis
...Show More Authors

Recently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2024
Journal Name
Egyptian Journal Of Aquatic Biology And Fisheries
Heavy Metals Levels in the Al-Shamiyah River: A Lotic Ecosystem Case Study
...Show More Authors

Monitoring lotic ecosystems is vital for addressing sustainability issues. The Al-Shamiyah River is the primary source of water for various daily activities in the Al-Shamiyah district. This study assessed the pollution levels of the river by measuring the concentration and distribution of heavy metals—specifically chromium, cadmium, manganese, copper, zinc, and lead—in both the river's water and sediments. The concentrations of heavy metals in the water ranged from 0.05 to 1.44µg/ L for copper (Cu), 1.57 to 7.25µg/ L for manganese (Mn), 0 to 1.7µg/ L for cadmium (Cd), 0.02 to 1.33µg/ L for lead (Pb), 0.08 to 2.74µg/ L for zinc (Zn), and 0.44 to 1.84µg/ L for chromium (Cr). In the particulate phase, the concentrations ranged from

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref