Objective: To conduct a standardized method for cavity preparation on the palatal surface of rat maxillary molars and to introduce a standardized method for tooth correct alignment within the specimen during the wax embedding procedure to better detect cavity position within the examined slides. Materials and methods: Six male Wistar rats, aged 4-6 weeks, were used. The maxillary molars of three animals were sectioned in the frontal plane to identify the thickness of hard tissue on the palatal surface of the first molar which was (250-300µm). The end-cutting bur (with a cutting head diameter of 0.2mm) was suitable for preparing a dentinal cavity (70-80µm) depth. Cavity preparation was then performed using the same bur on the tooth surface in the other three animals. Rats are then euthanized before dissecting, fixing, and demineralizing the teeth. For better alignment of teeth samples during the waxing procedure, K-file endodontic instrument size #8 was dipped in Indian ink. The file tip was inserted on the jaw bone at the buccal side of the tooth in a region opposed to the prepared cavity on the palatal side. Moreover, a small Dycal applicator instrument was used to mark the jaw bone on the mesial side of teeth samples as an orientation for the cutting surface. Results: Well-defined sections were obtained with a clear cavity extension within dentin and without any signs of pulp exposure in all samples. Conclusion: This pilot was conducted to perform an easy procedure for cavity preparation in rat molar teeth to obtain a clear histopathological section.
Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreAbstract
In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show MoreThe current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .
The human intellect and his ability to complex thinking is a characteristic that Allah has given him above all his creatures. Islam came to encourage the utilization of the mind by thought, contemplation and consideration of the kingdom of Allah, His signs and religion, and He gave us a set of legislation that preserves the mind and protects it from falling into error or deviation.
This research deals with one of the most important components of civilizations in general and Islamic civilization in particular, which is thinking and what is related to it. It is an essential and influential component in man's dealing with life around him and the for
... Show MoreThe absence of ecological perception in the local urbanization resulted in the lack of a clear conception of achieving sustainability in its simplest form in the urban reality and in the city of Baghdad in particular. The research assumes the possibility of achieving urban sustainability in Iraqi cities by applying the cities for the most effective methods to implemented ecological solutions and introducing appropriate urban planning tools and improve the living environment. The research focuses on the ability to define some aspects to achieve a sustainable local urban identity from global experiences. This was performed by proposing a scheduled theoretical framework, through which th
Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: The world is in front of two emerging problems being scarceness of virgin re-sources for bioactive materials and the gathering of waste production. Employment of the surplus waste in the mainstream production can resolve these problems. The current study aimed to prepare and characterize a natural composite CaO-SiO2 based bioactive material derived from naturally sustained raw materials. Then deposit this innovative novel bioactive coating composite materials overlying Yttria-stabilized tetragonal zirconia substrate. Mate-rials and method; Hen eggshell-derived calcium carbonate and rice husk-derived silica were extracted from natural resources to prepare the composite coating material. The manufac-tured powder was characterized
... Show More