It is found that hypersensitive teeth have a larger number and wider patent tubules than those of non-sensitive teeth. Objective: The aim of this study is to compare between the effects of diode laser at different power densities, with and without sodium fluoride on the sealing of exposed dentinal tubules and dentin permeability. Materials and methods: 118 teeth were used. Samples were divided into three major groups. The first consisted of 100 teeth used for permeability test. The second consisted of 16 teeth for measuring external surface temperature elevation while irradiation. The third, in turn, consisted of one pair of teeth observed under SEM for dentine surface morphology analysis. Results: For dentin permeability measurement, the results revealed a highly significant difference between the control group and 2, 3 W with varnish groups. For the external surface temperature elevation, the results revealed that temperature rise, for both laser alone and with varnish groups, was between (67-97.9 ∘C) at 1.6, 2 W. SEM analysis revealed that approximately optimum sealing of tubules occurred in 2W with the varnish group. Conclusions: The combined application of 940 nm diode laser at 2W with 809.7 W/cm² power densities, with sodium fluoride white varnish show a significant improvement in their effects on dentin permeability reduction as compared to each treatment alone.
The present study attempts to examine verbal/nonverbal impoliteness in the classroom interaction and outside it in one of the movies, namely, The Marva Collins. Impoliteness, which is significantly studied within pragmatics, is a negative attitude towards particular behaviors. It always presumes to have emotional concerns for at least one participant who has caused it. This study is an attempt to examine verbal/nonverbal impoliteness in The Marva Collins movie. The study aims to investigate the different types of impoliteness strategies used in the four selected scenes and find out whether the speaker’s status has anything to do with the types of impoliteness. Besides, the functions performed are also examined by following a qual
... Show MoreDr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.
In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very
... Show MoreIn Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interview
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreThis research deals with the nature of the Turkish attitude towards the events of the Arab Spring which the Arab region witnessed recently, as this attitude is characterized by hesitation and utter confusion about those events at its beginning. However, the development of events and the consequent repercussions led the Turkish decision makers of the foreign policy to reconsider their attitude towards those events for political, economic, cultural and social motives.
Humor is an interesting phenomenon that has been studied widely, yet it is considered a universal trait that cannot be an old subject for a study. This study is conducted to investigate humor from a universal pragmatic lens in a stand-up comedy show, namely, You Wanna Hear Something Crazy?. It aims to study humor as a coin with two sides, the production side and the understanding side. To achieve the aim of the study, the researchers use an eclectic contains Grice’s CP model (1975) and Habermas’s UP model (1979, 1984, 1987, 1998). The study has noted that while using the observance and the non-observance of the cooperative maxims to produce humor, the universal validity claims of truth, sincerity, and normative rightness for rea
... Show MoreThe experiment was carried out to study the effect of variety and gibberellic acid in concentration (0 and 50)mg.lat-1 and BL in five concentration (0, 0.50 ,1 ,2 and 3)mg.ltr-1 and their interaction in some chemical Characteristics and total chlorophyll for Dill plant . the experiment designed according Randomized Complete Block Design (RCBD) and three replicates per treatment, compared to the average using less significant difference at the level of probability (0.05) , the results showed the following:- The effect of brassinolide with it,s concentrations led to obtain a significant increase in all the studied characteristics, so the superiority of the concentration of 2 mg.L-1 of brassinolide in each of Ca, Mg,Fe, and total chlorophyll T
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More