Preferred Language
Articles
/
YBg8e5UBVTCNdQwC9i5N
Effect of Air–Particle Abrasion of Dentin Surface on Shear Bond Strength of Lithium Disilicate to Dentin Using Three Different Cements
...Show More Authors

This study aims to evaluate the influence of the air abrasion of dentin on the shear bond strength of lithium disilicate using three different types of luting cements. Sixty cylindrical specimens were milled from lithium disilicate CAD/CAM blocks (IPSe.max CAD). Sixty sound human maxillary premolar teeth were decoronated to the level of peripheral dentin, then randomly divided into three groups according to the type of luting cement used for the cementation of the lithium disilicate specimens (n = 20); Group A: Glass ionomer cement (Riva Self- Cure); Group B: Adhesive resin cement (Rely X Ultimate); Group C: Self-adhesive resin cement (Rely X U200). Each group was then further subdivided into two subgroups (n=10); Subgroups AI, BI, and CI, in which lithium disilicate specimens were cemented directly to dentin; Subgroups AII, BII, and CII, in which dentin surface was air abraded prior to cementation of lithium disilicate specimens. A computerized universal testing machine was used to measure the shear bond strength. A digital microscope was used to study the failure mode. SEM was used to analyze the cement-dentin interface of the de-bonded samples. The data were analyzed statistically using One-way ANOVA test and independent sample t-test at the level of significance of (0.05). Air abrasion of dentin improved the shear bond strength of lithium disilicate to dentin with all three types of cement.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
International Journal Of Physics And Research (ijpr)
GAMMA RAY PROPERTIES FROM70As NUCLEUS
...Show More Authors

Multipole mixing ratios for gamma transition populated in from reaction have been studied by least square fitting method also transition strength ] for pure gamma transitions have been calculated taking into account the mean life time for these levels .

Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Minimally invasive access cavities in endodontics
...Show More Authors

Background: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Odd Fibonacci edge irregular labeling for some trees obtained from subdivision and vertex identification operations
...Show More Authors

Let G be a graph with p vertices and q edges and  be an injective function, where k is a positive integer. If the induced edge labeling   defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 23 2019
Journal Name
Arma
Safe Mud Weight Window Determination: A Case Study from Southern Iraq
...Show More Authors

ABSTRACT:. The Lower Cretaceous Zubair formation is comprised of sandstones intercalated with shale sequences. The main challenges that were encountered while drilling into this formation included severe wellbore instability-related issues across the weaker formations overlaying the reservoir section (pay zone). These issues have a significant impact on well costs and timeline. In this paper, a comprehensive geomechanical study was carried out to understand the causes of the wellbore failure and to improve drilling design and drilling performance on further development wells in the field. Failure criteria known as Mogi-Coulomb was used to determine an operating mud weight window required for safe drilling. The accuracy of the geomechanical

... Show More
View Publication Preview PDF