Preferred Language
Articles
/
gxiflJQBVTCNdQwCmB2u
Cavity preparation model in rat maxillary first molars: A pilot study
...Show More Authors

Objective: To conduct a standardized method for cavity preparation on the palatal surface of rat maxillary molars and to introduce a standardized method for tooth correct alignment within the specimen during the wax embedding procedure to better detect cavity position within the examined slides. Materials and methods: Six male Wistar rats, aged 4-6 weeks, were used. The maxillary molars of three animals were sectioned in the frontal plane to identify the thickness of hard tissue on the palatal surface of the first molar which was (250-300µm). The end-cutting bur (with a cutting head diameter of 0.2mm) was suitable for preparing a dentinal cavity (70-80µm) depth. Cavity preparation was then performed using the same bur on the tooth surface in the other three animals. Rats are then euthanized before dissecting, fixing, and demineralizing the teeth. For better alignment of teeth samples during the waxing procedure, K-file endodontic instrument size #8 was dipped in Indian ink. The file tip was inserted on the jaw bone at the buccal side of the tooth in a region opposed to the prepared cavity on the palatal side. Moreover, a small Dycal applicator instrument was used to mark the jaw bone on the mesial side of teeth samples as an orientation for the cutting surface. Results: Well-defined sections were obtained with a clear cavity extension within dentin and without any signs of pulp exposure in all samples. Conclusion: This pilot was conducted to perform an easy procedure for cavity preparation in rat molar teeth to obtain a clear histopathological section.

Scopus Crossref
View Publication
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (71)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
A Hyperbolic Potential Field Model for Designing an Einzel Lens of Low Aberrations
...Show More Authors

An analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation of a Parallel Stress-strength Model Based on the Inverse Kumaraswamy Distribution
...Show More Authors

   

 The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Prevalence and localization of the posterior superior alveolar artery in relation to the floor of the maxillary sinus and alveolar crest among sample of Iraqis using computed tomography
...Show More Authors

Background: Posterior superior alveolar artery (PSAA) is branch of the maxillary artery. It usually supplies the lateral wall of the sinus and overlying membrane. Evaluation and awareness of the anatomy of maxillary sinus before surgery is crucial to avoid surgical complications. The aim of this study is to examine the prevalence, location of the (PSAA) in relation to the floor of the maxillary sinus and alveolar crest using computerized tomography (CT) scans. Materials and Methods: This study included 180 Iraqi subjects (99 males and 81 females) with age more than 16 years old. CT scans for (right and left) Maxillary sinuses were done for each patient. The information obtained was assessed in a coronal multi planar reconstructions images (

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
Harmonization formative in the design of interior spaces Hall of discussions in the design department (a model): بدريا محمد حسن فرج
...Show More Authors

Can not reach a comprehensive concept for interior design through the use of Harmonization term according transformations experienced by the terms of the variables associated with the backlog of cultures that characterize concepts according to the nature of the users of the spaces in the design output, which necessitates the meaning of the combination of knowledge, art, science, such as the type of perceptions design the Harmonization cognitive science with art to create products of the use of design configurations that help the designer to put such a product within the reality and like the fact that reliable, as well as the rational knowledge tend somehow to the objective specifically in facilitating the substance subject to perceptible

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The Interchange of Sign Transformation between Locality and Universality in the Iraqi Theatre, "Romeo and Juliet in Baghdad Show" - A Model
...Show More Authors

The research deals with the interchange of the sign transformed from the universal to the local in the theatrical show through the direction processing in the production of a communicative artistic discourse and message, thus making the process of reading the speech and recognizing it by taking into account the cultural differences, customs and local rituals of each country, region, or area. The problem of the research was focused on answering the following question: What are the requirements for the sign in terms of its transformation between the universality and locality in the read-out?

               The importance of research is to determine the requiremen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Preparation and Study Hardness and Thermal Conductivity (Tc) to Polyester Resin Composite with (Titanium Dioxide, Zinc Oxide, Acrylonitril, Wood Flour Coconut
...Show More Authors

This study is attempt to improve thermal isolation through measuring thermal conductivity composite of on polyester resin with fillers of (TiO2, ZnO, Acrylonitril, wood flour Coconut (Wf). The grain size of the fillers is 200 µm. The number of samples is (16) in addition to the virgin sample; these samples are prepared by cast molding method for polyester with filler volume fractions (5%, 10%, 15% and 20%). Shore hardness tests were used to measure the hardness and Lee disk method for thermal conductivity. The experimental results showed that the (20% ZnO) sample has the maximum value of thermal conductivity where (20% w.f) has minimum thermal conductivity .on the other hand (15% ZnO) sample give the maximum value of hardness where (20% w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Preparation, Characterization and Spectroscopic Study of New Tridentate Schiff Base and its Cu(II), Ni(II) and Zn(II) Metal Complexes
...Show More Authors

A new tridentate ligand has been synthesized derived from phenyl(pyridin-3-yl)methanone. Three coordinated metal complexes were prepared by complexation of the new ligand with Cu(II), Ni(II) and Zn(II) metal salts. The new Schiff base “benzyl -2-[phenyl(pyridin-3-yl)methylidene]hydrazinecarbodithioate” and the new metal complexes were characterized using various physico-chemical and spectroscopic techniques. From the analysis results, the expected structure to the metal complexes are octahedral in geometry for Cu(II) complex, square planner for Ni(II) and tetrahedral for Zn(II) complex. The new compounds are expected to show strong bioactivity against bacteria and cancer cells.

View Publication Preview PDF
Crossref