Preferred Language
Articles
/
BxZ-dIcBVTCNdQwCe0x2
Resistance of bonded premolars to four artificial ageing models post enamel conditioning with a novel calcium-phosphate paste
...Show More Authors

Background: This in vitro study compares a novel calcium-phosphate etchant paste to conventional 37% phosphoric acid gel for bonding metal and ceramic brackets by evaluating the shear bond strength, remnant adhesive and enamel damage following water storage, acid challenge and fatigue loading. Material and Methods: Metal and ceramic brackets were bonded to 240 extracted human premolars using two enamel conditioning protocols: conventional 37% phosphoric acid (PA) gel (control), and an acidic calcium-phosphate (CaP) paste. The CaP paste was prepared from β-tricalcium phosphate and monocalcium phosphate monohydrate powders mixed with 37% phosphoric acid solution, and the resulting phase was confirmed using FTIR. The bonded premolars were exposed to four artificial ageing models to examine the shear bond strength (SBS), adhesive remnant index (ARI score), with stereomicroscopic evaluation of enamel damage. Results: Metal and ceramic control subgroups yielded significantly higher (p ˂ 0.05) SBS (17.1-31.8 MPa) than the CaP subgroups (11.4-23.8 MPa) post all artificial ageing protocols, coupled with higher ARI scores and evidence of enamel damage. In contrast, the CaP subgroups survived all artificial ageing tests by maintaining adequate SBS for clinical performance, with the advantages of leaving unblemished enamel surface and bracket failures at the enamel-adhesive interface. Conclusions: Enamel conditioning with acidic CaP pastes attained adequate bond strengths with no or minimal adhesive residue and enamel damage, suggesting a suitable alternative to the conventional PA gel for orthodontic bonding.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 18 2019
Journal Name
Journal Of Laser Applications
Testing and characterization of sintered β-tricalcium phosphate coat upon zirconia dental implant using Nd:YAG laser
...Show More Authors

This study aims to fabricate and assess the β-tricalcium phosphate (β-TCP) bioactive ceramic coat layer on bioinert ceramic zirconia implants through the direct laser melting technique by applying a long-pulsed Nd:YAG laser of 1064 nm. Surface morphologies, adherence, and structural change in the coatings were evaluated by optical microscopy, field emission scanning electron microscope, hardness, and x-ray diffractometer. The elastic modulus (EM) of the coating was also determined using the nanoindentation test. The quality of the coating was improved when the laser power was 90 W with a decrease in the scan speed to 4 mm s−1. The chemical composition of the coat was maintained after laser processing; also, the Energy Dispersive

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Continuous Extraction and Stripping of Neptunium By Fresh and Degradated Tributyle Phosphate Using Co-60 Cell
...Show More Authors

    The behaviour of Np-239 during the Continuous extraction and stripping  was followed . Three Continuous extraction experiments were carried out . In the first experiment the extraction and stripping were carried out by using Tributyl Phosphate / treated odorless kerosene as the organic phase , while the aqueous phase was uranium and neptunium-239 dissolved in 3M HNO3 . In the second experiment irradiation of organic phase up to 30 M rad were carried out , while keeping the aqueous phase as it is in the first experiment. In the third experiment , the acidity of the aqueous phase was 1.5M instead of 3M and keeping the organic phase as it is in experiment 1. The results obtained in tables 1-3 show the possibility of

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 02 2023
Journal Name
Contemporary Trends And Issues In Science Education
Using Multi-faceted Rasch Models to Understand Middle School Students’ Argumentation Around Scenarios Grounded in Socio-scientific Issues
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Apr 27 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Total L-carnitine and insulin resistance in non-obese and obese Iraqi women with polycystic ovary syndrome
...Show More Authors

Background: Polycystic ovary syndrome (PCOS) is one of the most frequent endocrine illnesses affecting reproductive - age women. L-carnitine has important roles in oxidative stress, energy production and glucose metabolism. It affects insulin resistance as decreased plasma carnitine level has been well reported in type II diabetes mellitus. Hence, it means L-carnitine may reduce insulin resistance which is found in PCO disease. Objective: This study aims to measure the level of L-carnitine and insulin resistance in both obese and non- obese patients with PCOS. Patients and Methods: Sixty women within the reproductive age with PCOS (30 obese and 30 non- obese) were recruited from the Gynecology and Obstetrics Outpatient Clinic in Baghdad T

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 02 2020
Journal Name
International Journal Of Pharmaceutical Research
Association between Serum Leptin Level and Insulin Resistance in Acromegalic Iraqi Patients with Type 2 Diabetes Mellitus
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref