Preferred Language
Articles
/
Wxg3e5UBVTCNdQwCTy6K
Micro-shear bond strength of a novel resin-modified glass ionomer luting cement (eRMGIC) functionalized with organophosphorus monomer to different dental substrates
...Show More Authors

Objectives: This study aims to assess and compare the micro-shear bond strength (μSBS) of a novel resin-modified glass-ionomer luting cement functionalized with a methacrylate co-monomer containing a phosphoric acid group, 30 wt% 2-(methacryloxy) ethyl phosphate (2-MEP), with different substrates (dentin, enamel, zirconia, and base metal alloy). This assessment is conducted in comparison with conventional resin-modified glass ionomer cement and self-adhesive resin cement. Materials and methods: In this in vitro study, ninety-six specimens were prepared and categorized into four groups: enamel (A), dentin (B), zirconia (C), and base metal alloys (D). Enamel (E) and dentin (D) specimens were obtained from 30 human maxillary first premolars extracted during orthodontic treatment. For zirconia and metal alloys, 48 disks were manufactured using IPS e.max ZirCAD through dry milling and Co–Cr powder alloy by selective laser milling. Each group was further subdivided into three subgroups (n = 8) according to the luting cement used: (1) Fuji PLUS resin-modified glass ionomer luting cement (FP) as a control cement, (2) modified control cement (eRMGIC), and (3) RelyX U 200 (RU 200) self-adhesive resin cement. The two-way analysis of variance and Tukey’s HSD were used to assess the data obtained from measuring the μSBS of the samples. Results: The results of this study showed that the mean μSBS values of eRMGIC were statistically higher compared to FP in all tested groups (p < 0.001). The mean μSBS results of eRMGIC were non-significantly different from those recorded by RU 200 for all substrates except for the dentin substrate, where the RU200 cement produced significantly higher strength (p < 0.001). The failure modes were limited to a combination of mixed and adhesive failures without pure cohesive failure. Significance: The functionalization of FP with an organophosphorus co-monomer (2-MEP) directly affects the adhesion performance of the functionalized cement, which may be utilized to develop a new type of acid-base cement. It exhibited a performance comparable to that of resin-based cement and should serve well under different clinical conditions.

Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
MODIFIED ALVARADO SCORING SYSTEM. HOW MUCH HELPFUL?
...Show More Authors

Background:-The Modified Alvarado Scoring
System (MASS) has been reported to be a cheap
and quick diagnostic tool in patients with acute
appendicitis. However, differences in diagnostic
accuracy have been observed if the scores were
applied to various populations and clinical settings.
Objectives:- The purpose of this study was to
evaluate the diagnostic value of Modified Alvarado
Scoring System in patients with acute appendicitis
in our setting.
Methods:-one hundre twenty eight patients, were
included in this study, admitted to Al-Kindy
teaching hospital from June 2009 to June 2010.
Patients’ age ranged from 8 to 56 years (21±10)
they were divided into three groups; paediatrics,
child bear

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Language Studies
Syntactic Deviation in Abdul-Wahhab Al-Bayyati Poetry With Reference to English Syntax A Functional Study
...Show More Authors

This research is an attempt to study aspects of syntactic deviation in AbdulWahhab Al-Bayyati with reference to English. It reviews this phenomenon from an extra-linguistic viewpoint. It adopts a functional approach depending on the stipulates of systemic Functional Grammar as developed by M.A.K. Halliday and others adopting this approach. Within related perspective, fairly’s taxonomy (1975) has been chosen to analyze the types of syntactic deviation because it has been found suitable and relevant to describe this phenomenon. The research hypothesizes that syntactic deviation is pervasive in Arabic poetry, in general and in Abdul-Wahhab Al-Bayyati Poetry in specific, and can be analyzed in the light of systemic Functional Grammar

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 29 2025
Journal Name
Journal Of Baghdad College Of Dentistry
A study to compare the cleaning efficiency of different irrigation systems for macro debris removal in instrumented canals (An in vitro study)
...Show More Authors

Background: Irrigation of the canal system permits removal of residual tissue in the canal anatomy that cannot be reached by instrumentation of the main canals so the aim of this study was to compare and evaluate the efficiency of conventional irrigation system, endoactivator sonic irrigation system,P5 Newtron Satelec passive ultrasonic irrigation and Endovac irrigation system in removing of dentin debris at three levels of root canals and to compare the percentage of dentin debris among the three levels for each irrigation system. Materials and methods: Forty extracted premolars with approximately straight single root canals were randomly distributed into 4 tested groups of 10 teeth each. All canals were prepared with Protaper Universal ha

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
Provisions for a Muslim to be naturalized with the citizenship of non-Muslim countries
...Show More Authors

Praise to Allah, Lord of the Worlds. Thank you very much. Blessed. As his face should be majestic and great. His authority, and may peace and blessings be upon our master Muhammad, a perpetual blessing until the Day of Judgment

And upon the God of purity, His righteous companions, and those who follow them in righteousness until the Day of Judgment. But after:-

Anyone who looks into the history of nations, peoples, and the conditions of human beings will see that naturalization as a person’s affiliation to a particular state is something that happened only in recent centuries. In ancient times, a person’s loyalty was to the tribe to which the person belonged, and he was integrated into it and attributed to it, and in

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref