Background: This in vitro study compares a novel calcium-phosphate etchant paste to conventional 37% phosphoric acid gel for bonding metal and ceramic brackets by evaluating the shear bond strength, remnant adhesive and enamel damage following water storage, acid challenge and fatigue loading. Material and Methods: Metal and ceramic brackets were bonded to 240 extracted human premolars using two enamel conditioning protocols: conventional 37% phosphoric acid (PA) gel (control), and an acidic calcium-phosphate (CaP) paste. The CaP paste was prepared from β-tricalcium phosphate and monocalcium phosphate monohydrate powders mixed with 37% phosphoric acid solution, and the resulting phase was confirmed using FTIR. The bonded premolars were exposed to four artificial ageing models to examine the shear bond strength (SBS), adhesive remnant index (ARI score), with stereomicroscopic evaluation of enamel damage. Results: Metal and ceramic control subgroups yielded significantly higher (p ˂ 0.05) SBS (17.1-31.8 MPa) than the CaP subgroups (11.4-23.8 MPa) post all artificial ageing protocols, coupled with higher ARI scores and evidence of enamel damage. In contrast, the CaP subgroups survived all artificial ageing tests by maintaining adequate SBS for clinical performance, with the advantages of leaving unblemished enamel surface and bracket failures at the enamel-adhesive interface. Conclusions: Enamel conditioning with acidic CaP pastes attained adequate bond strengths with no or minimal adhesive residue and enamel damage, suggesting a suitable alternative to the conventional PA gel for orthodontic bonding.
The research aims to identify the obstacles facing the application of electronic management in our university libraries, including the central library of the University of Baghdad and the central library of Al-Mustansiriya University, the research sample, as they are among the main libraries that used electronic technologies in managing some of their work and in providing their services, and they have a website via the Internet. The research relied on the case study method to identify the obstacles by visiting the two libraries, interviewing their managers and employees responsible for the departments, and answering inquiries about the obstacles that prevent the application of electronic management in order to identify them and find appropr
... Show MoreRecently, that there has been a decline in the levels of female players for this event in recent years compared to developments in the world, as this activity depends to achieve the highest level of performance on the physical capabilities and physiological indicators of the player who It is reflected in the achievement, which results in the loss of time for Iraqi female runners compared to the world champions in the (100) meter hurdles competition, which reflects on the level of achievement. The two researchers used the experimental approach in addressing the research problem, and the experimental design used the method of the two equal groups, the two experiments with the pre and post-tests. Female runner and second experimental group (4)
... Show MoreHusbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb
... Show MoreA comparative study was carried out on ecological and genetical adaptation of three Iraqi
freshwater snails, Physa acuta, Melanopsis buccinoidea and Melanoides tuberculata, in
respect to acute toxicity of heavy metals (Zn, Cd and Hg). Longevity are used as poisoning
tolerance criterion. LT 50 and LT 100 were determined for the studied snails at (0.5, 1, 5, and
10 ppm), for the three metals. Results indicated that Physa acuta had a higher tolerance than
Melanopsis buccinoidea and Melanoides tuberculata, which was the lower one. Previous
exposure to heavy metals in the original habitat was affecting on experimental tolerance and
no relationships of physical and chemical factors (total hardness, temperature, D. O. and
Purpose: To explore whether baseline matrix metalloproteinase (MMP)-8 level in gingival crevicular fluid (GCF) (exposure) can predict the outcome (reduction in probing pocket depth (PPD) (outcome)) of nonsurgical periodontal therapy (NSPT) (manual or ultrasonic or both) in patients with periodontitis (population/problem) after 3 months. Methods: Six databases (PubMed, Cochrane library, ProQuest, Ovid, Scopus, EBSCO) were searched for relevant articles published until 30 July 2021. Retrieved articles were passed through a three-phase filtration process on the basis of the eligibility criteria. The primary outcome was the change in PPD after 3 months. Quality of the selected articles was assessed using Cochrane Risk of Bias tool (RoB2
... Show MoreAntibiotic resistance is a problem of deep scientific concern both in hospital and community settings. Rapid detection in clinical laboratories is essential for the judicious recognition of antimicrobial resistant organisms. So, the growth of Uropathgenic Escherichia coli (UPEC) isolates with Multidrug-resistant (MDR) and Extensively Drug-resistant (XDR) profiles that thwart therapy for (UTIs) has been detected and has straight squeezed costs and extended hospital stays. This study aims to detect MDR- and XDR-UPEC isolates. Out of 42 UPEC clinical isolates were composed from UTI patients. The bacterial strains were recognized by standard laboratory protocols. Susceptibility to antibiotic was measured by the standard disk diffusi
... Show MoreIn this paper, we have investigated some of the most recent energy efficient routing protocols for wireless body area networks. This technology has seen advancements in recent times where wireless sensors are injected in the human body to sense and measure body parameters like temperature, heartbeat and glucose level. These tiny wireless sensors gather body data information and send it over a wireless network to the base station. The data measurements are examined by the doctor or physician and the suitable cure is suggested. The whole communication is done through routing protocols in a network environment. Routing protocol consumes energy while helping non-stop communic
... Show MoreDespite extensive investigations, an effective treatment for sepsis remains elusive and a better understanding of the inflammatory response to infection is required to identify potential new targets for therapy. In this study we have used RNAi technology to show, for the first time, that the inducible lysophosphatidylcholine acyltransferase 2 (LPCAT2) plays a key role in macrophage inflammatory gene expression in response to stimulation with bacterial ligands. Using siRNA- or shRNA-mediated knockdown, we demonstrate that, in contrast to the constitutive LPCAT1, LPCAT2 is required for macrophage cytokine gene expression and release in response to TLR4 and TLR2 ligand stimulation but not for TLR-independent stimuli. In addition, cells transfe
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show More