Background. To identify the most common retention protocols practiced by Iraqi orthodontists using a specially designed e-survey. Furthermore, this study aimed to assess the effect of sociodemographic factors on the participant’s choice. Methods. Two hundred and twenty-five questionnaires with 23 multiple choice questions were sent to members of the Iraqi Orthodontic Society. The questionnaire was organized into four sections representing information about sociodemographic status of the orthodontists, factors affecting the selection of the retention system, commonly used retainers in the upper arch and lower arch, and duration of the retention system. The chi-square test was used to test the significant association between different variable and sociodemographic factors. Results. The response rate was 87.5%. The majority of the respondents considered the original malocclusion (80.2%) and clinical experience (49.7%) as the main factors for choosing the retention protocol. In the maxillary arch, a combination of vacuum-formed retainer and fixed retainer (35%) was mostly applied; in the mandibular arch, a fixed retainer was mainly used (46.7%). Most of the respondents recommended initial full-time wearing of a removable appliance (78.2%), especially in the first 3–6 months (47.2%). According to the respondents, bonding a fixed retainer to all anterior teeth was most common (79.7%), fabricated, and adapted directly inside the patient’s mouth (75.1%). More than half used flowable composite (54.8%) and recommend leaving the retainer forever (53.8%). Most of the variables showed a statistically significant association between the sociodemographic factors and type, duration, and fabrication of the retainer used. Conclusions. A combination of removable and fixed retainers was commonly used in orthodontics retention, and sociodemographic factors significantly affected retainer choice.
Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show MoreBackground: Undergraduate dental students are more susceptible to situations of stress that affected quality of sleep, such profiles of stress may result in sleep bruxism and/or awake bruxism, parafunctions that can affect oral and general health. The aim of the study was to evaluate the association of sleep bruxism, awake bruxism and sleep quality among dental students. Materials and methods: A cross-sectional study was performed including 260 Iraqi dental students from university of Baghdad aged from 20to25years old. Students enrolled in the third and fifth class participated in the study. The Pittsburgh Sleep Questionnaire Index (PSQI) was used for data collection. The PSQI was distributed during lecture classes. Sleep bruxism and awake
... Show MoreObjective : To study the effect of some risk factors like age, smoking and Diabetes mellitus (DM) among patients with
certain cardiovascular diseases (Angina pectoris and Myocardial infarction), in addition to the assessment of the Creactive
protein (CRP) in the sera of those patients.
Methodology: The study was carried out on (100) subjects who were hospitalized in the Iraqi Center of heart Diseases
in Baghdad city and were suffering from Myocardial InfarcƟon (MI) (16) and Angina Pectoris (AP) (79) or from both (5)
over a period from September 2009 to June 2010. The results of paƟents were compared with those of (30) healthy
and age-matched individuals as a control group. Data were obtained from patients who were alr
Objectives: The current study aims at identifying the level of perceived stress among nursing college students and determining the factors associated with stress they have. Methodology: A cross-sectional descriptive study initiated for the period on November 1st, 2014 to May 1st, 2015. The study has been conducted on the undergraduate nursing college students / University of Baghdad. The sample of the study was consisted of (128) students who were selected purposively. The questionnaire of the study was adopted and modified for the present study which consisted of socio-demographic data and the scale of
Applications of nonlinear, time variant, and variable parameters represent a big challenge in a conventional control systems, the control strategy of the fuzzy systems may be represents a simple, a robust and an intelligent solution for such applications.
This paper presents a design of fuzzy control system that consists of three sub controllers; a fuzzy temperature controller (FC_T), a fuzzy humidity controller (FC_H) and a ventilation control system; to control the complicate environment of the greenhouse (GH) using a proposed multi-choice control system approach. However, to reduce the cost of the crop production in the GH, the first choice is using the ventilation system to control the temperature and humidit
... Show MoreTo investigate the efficacy of polyether‐ether‐ketone (PEEK) wire as a fixed orthodontic retainer, by comparing its performance to other retainer wires and optimizing its adhesion to composite bonding materials.
Retainer wires of 15 mm segments were used, PEEK wires were prepared in cylindrical form with 0.8 mm diameter, and had two surface treatments namely air‐abrasion and conditioning with adhesive system. Three different metallic retainer wires were used for comparison and three tests were performed; two tests measured debonding force and associated wire deflec
Nanofluids (dispersion of nanoparticles in a base fluid) have been suggested as promising agents in subsurface industries including enhanced oil recovery. Nanoparticles can easily pass through small pore throats in reservoirs formations; however, physicochemical interactions between nanoparticles and between nanoparticles and rocks can cause a significant retention of nanoparticles. This study investigated the transport, attach, and retention of silica nanoparticles in core plugs. The hydrophilic silica nanoparticles were injected into limestone core as nanofluid of different nanoparticles size (5 nm, and 20 nm), concentration (0.005 – 0.1 wt% SiO2), and base fluid salinity (0 – 3 wt% NaCl) at different temperatures (23, and 50 °C). D
... Show MoreChronic liver disease (CLD) can potentially cause disruptions in the normal functioning of various endocrine organs responsible for producing hormones. As a result, individuals suffering from CLD may experience fluctuations or imbalances in the levels of certain hormones within their bodies. As well as they frequently have suppressed immune systems making them more vulnerable to parasite infections. The primary objective of this study was to investigate the association between Toxoplasma gondii infections and liver function by analyzing the interplay between these parasites and hormones. This study was conducted in Baghdad, Iraq from December 2021 to May 2022. One hundred and twenty male patients with Chronic liver disease (CLD) (ag
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More