Background: White spot lesion considered as irreversible tooth demineralization presenting challenge to orthodontists during treatment schedules, fluoride was the most successfully used measure to overcome this challenge. Materials and method: A total of forty sound human permanent premolars were used in the present study and categorized into four groups, in one group the teeth were bonded with stainless steel brackets using Resin-modified glass ionomer cement (RMGIC) and the other three groups the teeth were bonded with light cured composite Resilience® (Ortho technology Co., USA). Group A; Acidulated phosphate fluoride (APF) topical gel (Mfg by DEEPAK PRODUCTS, INC, USA), fluoride ion 1.23% applied on examine area for four minute. Gro
... Show MoreThe Water Quality Index (WQI) is an important parameter in describing the water resources' suitability for human uses and is one of the most effective methods of describing water quality and indicative of assessing water quality and suitability for human utilization and the health of ecosystems. WQI of the Canadian Council of Ministers of the Environment (CCME) was used in the study to describe the Shatt al-Arab water quality in Basrah Southern Iraq, and its suitability for drinking use. The data for analyzing river water samples were adopted from five stations along the river every month during the years from 2014 to 2018 by the Iraqi Ministry of Environment, as it included the measurement of acidity function PH, Dissolved Oxyg
... Show MoreThe main objective of this study is to develop a rate of penetration (ROP) model for Khasib formation in Ahdab oil field and determine the drilling parameters controlling the prediction of ROP values by using artificial neural network (ANN).
An Interactive Petrophysical software was used to convert the raw dataset of transit time (LAS Readings) from parts of meter-to-meter reading with depth. The IBM SPSS statistics software version 22 was used to create an interconnection between the drilling variables and the rate of penetration, detection of outliers of input parameters, and regression modeling. While a JMP Version 11 software from SAS Institute Inc. was used for artificial neural modeling.
&nb
... Show MoreBackground: Young children’s oral health maintenance and outcomes are influenced by their parent’s knowledge and beliefs, which affect oral hygiene and healthy eating habits. This study aims at assessing caries risk in children aged 6 months to 6 years attending the Specialized Center of Preventive and Pediatric Dentistry Center at Al-Resafa sector in Baghdad. Materials and Methods: A cross-sectional study was conducted from 15 May – 15 June 2018, all children attended the center (80 children) were assessed by using the standard caries risk assessment tool of the American Academy of Pediatric Dentistry (AAPD). Results: The highest percentage of children was as follows: no fluoride exposure 44(55%), did not brush 46(5
... Show MoreThe petrophysical analysis is very important to understand the factors controlling the reservoir quality and production wells. In the current study, the petrophysical evaluation was accomplished to hydrocarbon assessment based on well log data of four wells of Early Cretaceous carbonate reservoir Yamama Formation in Abu-Amood oil field in the southern part of Iraq. The available well logs such as sonic, density, neutron, gamma ray, SP, and resistivity logs for wells AAm-1, AAm-2, AAm-3, and AAm-5 were used to delineate the reservoir characteristics of the Yamama Formation. Lithologic and mineralogic studies were performed using porosity logs combination cross plots such as density vs. neutron cross plot and M-N mineralogy plot. Thes
... Show MoreOne of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreThe use of varied quantities of orphenadrine to protect stainless steel against corrosion in an acidic media at 298 K has been investigated. It was observed that when the drug's concentration is increased, the drug's speed of corrosion lowers. The data of inhibition efficiency (percent IE) in the presence of orphenadrine drug and corrosion resistance showed that the highest protection efficiency was achieved with the best concentration, and that the corrosion rate decreased with increasing orphenadrine drug concentrations, making it a good inhibitor for stainless steel in an acidic environment. The theoretical investigation proved the efficiency of the drug for inhibition, as the drug is absorbed on the surface of the stainless st
... Show MoreThe aim of this study was to evaluate the possibility of using Lactobacillus cells as a probiotic to treat some vaginal infections. For this purpose, thirty Lactobacillus isolates were collected from vaginal samples subjected to a screening program to investigate their antagonism abilities against four vaginosis species: Pseudomonas aeruginosa, Escherichia coli, Klebsiella pneumonia and Proteus spp. Eighteen isolates were selected from the primary screening (agar plug diffusion method) based on their ability to inhibit the growth of 4 indicators which then subjected to a secondary screening program with two methods: detection of bacteriocin activity and
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show More