Background: Crown preparation of vital teeth involve the removal of a sound tooth structure, and when enamel removed this lead to exposed dentin with an increase in the number of open dentinal tubules also the diameter of dentinal tubules will increase, furthermore lead to increase movement of fluids inside the tubules all that causes post preparation sensitivity. The aim of this study is to evaluate the effect of desensitizing by Er:Cr:YSGG laser on shear bond strength of prepared tooth and resin cement. Materials and methods: Thirty sound maxillary premolars, grouped into three groups(n=10). Group A is the control group, group B irradiated by Er:Cr:YSGG laser with (0.25 W, 20 Hz, 10%water and air), group C irradiated by Er:Cr:YSGG laser with (0.5 W, 20 Hz, 10% water and air). Results: SEM examination showed complete occlusion of opened dentinal tubules after laser irradiation of both groups that irradiated with laser. Statistical analysis showed significant increase in surface roughness in group B and C. SBS was significantly increase in group B with no significant increase in group C. Conclusion: Er:Cr:YSGG laser can occlude open dentinal tubules without and adverse effect on the retention of the restoration, on the contrary it increase bonding strength. And this increasing was significant in group B with (0.25W, 20 Hz, 10 % water and air). suggestion: so the parameters used in group B (0.25 W, 20Hz, 10 % water and air) is recommended for desensitizing prepared tooth and induce enhancement to the bonding strength of resin to tooth surface.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreImaging by Ultrasound (US) is an accurate and useful modality for the assessment of gestational age (GA), estimation fetal weight, and monitoring the fetal growth during pregnancy, is a routine part of prenatal care, and that can greatly impact obstetric management. Estimation of GA is important in obstetric care, making appropriate management decisions requires accurate appraisal of GA. Accurate GA estimation may assist obstetricians in appropriately counseling women who are at risk of a preterm delivery about likely neonatal outcomes, and it is essential in the evaluation of the fetal growth and detection of intrauterine growth restriction. There are many formulas are used to estimate fetal GA in the world, but it's not specify fo
... Show MorePraise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreABSTRACT Pulmonary alveolar microlithiasis is rare infiltrative pulmonary disease characterized by intra-alveoli deposition of microliths. We present a familial case of an adult female with complaint of progressive shortness of breath on exertion. Chest radiograph showed innumerable tiny dense nodules, diffusely involving both lungs mainly the lower zones. High-resolution CT scan illustrated widespread intra-alveolar microliths, diffuse ground-glass attenuation areas and septal thickening predominantly in the basal regions. Chest radiograph is all that is needed for the diagnosis of this case but CT scan was done to demonstrate the extent and severity of this disease
Background: COVID-19 is a disease that started in Wuhan/China in late 2019 and continued through 2020 worldwide. Scientists worldwide continue to research to find vaccines, treatments, and medication for this disease. Studies also conenue to find the pathogenicity and epidemiology mechanisms. Materials and Methods: In this work, we analyzed cases obtained from Alshifaa center in Baghdad/Iraq for 23/2/2020-31/5/2020 with total instances of 797, positive cases of 393, and death cases of 30. Results: Results showed that the highest infection cases were among people aged between 41-45. Also, it was found that males' number of cases was more than females. In contrast, death cases were significantly higher in males than females. It was not
... Show MoreDespite efforts to contain and manage the SARS-CoV-2 outbreak which was declared a public health emergency of international concern in January 2020 by the World Health Organization (WHO), the COVID-19 pandemic still remains a major global challenge. Patients who display the classical symptoms of the infection are easily identified, tested, isolated and monitored. However, many cases of infected asymptomatic patients have been documented. These patients are not easily identified even though many evidences suggest that they can spread the virus to others. How and why these COVID-19 asymptomatic presentations occur remain unclear. The many theories and views are conjectural, and supporting evidences are still needed. In this review, we
... Show More