Abstract Background: This in-vitro study was to evaluated bitewing radiograph and tactile examination for detection secondary caries adjacent to amalgam restorations. Material and method: Sixty primary extracted molars with class I and class II amalgam restorations were selected from children, and examined by bitewing radiographs were taken by using film holders and interpreted on a backlit screen without magnification. Then, we used tactile examination with blunt probe. Result: The result of this study showed that the best cut-off points for the sample were found by a Receiver Operator Characteristic (ROC) analysis, and the area under the ROC curve and the sensitivity, specificity and accuracy of the techniques were calculated for enamel (D1) and dentine (D2) thresholds. These parameters were found for each techniques and then compared by the Cochran's Q test. The tactile examination presented the fair techniques for detecting secondary caries at enamel thresholds for both occlusal and proximal surfaces, While, bitewing radiograph presented good techniques at dentin thresholds. Conclusion: Tactile examination represented the best performance for detecting enamel secondary caries. While, bitewing radiograph represented the best performance for detecting dentin secondary caries
In this search, a new bioluminescent technique was proved for pyrophosphate which was employed to single- nucleotide polymorphism (SNP) diagnosis using one-base extension reaction. Four Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG, GyrA) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad., also one specimen was used as a negative control. The procedure of this assay was as follows. A specific primer within each aliquot owning a short 3-OH end of the base of the target gene was hybridized to the single-stranded DNA template. Then, (exo-) Klenow DNA polymerase and one of either ?-thio-dATP, dTTP, dGTP, or dCTP
... Show MoreAbstract:
In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreBackground: The apical seal is the single most important factor in determining the success of surgical endodontics, the aim of this study was to compare the sealing ability of Mineral Trioxide Aggregate in three different cavity designs. Materials and Methods: Thirty extracted human single-rooted teeth were divided into three groups of ten teeth per group, a retrograde cavity preparation was carried out using a low speed handpiece and round bur with parallel walls in the first group, ultrasonic retrotip and unit in the second group and a low speed handpiece with a carbide inverted cone bur with undercuts in the third group, all the cavities were filled with MTA. microleakage was measured by dye penetration technique using methylene blue. Re
... Show MoreBackground: The long term survival of dental implants is evaluated by the amount of crestal bone loss around the implants. Some initial loss of bone around dental implants is generally expected. There is reason to believe that reflecting a mucoperiosteal flap promotes crestal bone loss in the initial phase after an implant has been inserted. The surgical placement of a dental implant fixture is constantly changing and in recent years, there has been some interest in developing techniques that minimize the invasive nature of the procedure, with flapless implant surgery being advocated. The purpose of this study was to compare the radiographic level of the peri- implant bone after implant placement between traditional flapped surgery and f
... Show MoreWhile many educators are highly focused on state test, it is important to consider that
over the course of a year, instructors can build in many opportunities to assess how learners
are learning. Therefore, assessment techniques are considered a good method to get benefit
for both instructors and learners in the process of teaching and learning. The sample consists
of 27 learners who participated in TOEFL training course in the Development and Continuous
Education Centre. Validity and reliability were verified.
To fulfill the aims and verify the hypothesis which reads as follows” It is hypothesized
that the TOEFL learners' scores will not be increased after TOEFL course training.” T-test
for two dependent samp
Background: Dental implant is one of the most important options for teeth replacement. In two stage implant surgery, a few options could be used for uncovering implants, scalpel and laser are both considered as effective methods for this purpose. The Aim of the study: To compare soft tissue laser and scalpel for exposing implant in 2nd stage surgery in terms of the need for anesthesia, duration of procedure and pain level assessment at day 1 and day 7 post operatively using visual analogue scale . Materials and methods: Ten patients who received bilateral implants participated after healing period completed, gingival depth over each implant was recorded and then implant(s) were exposed by either scalpel or laser with determination for th
... Show MoreThe distortion, which occurs to the image often affects the existing amount of information, weakens its sharpness, decreases its contrast, thus leads to overlapping details of the various regions, and decreases image resolution. Test images are used to determine the image quality and ability of different visual systems, as we depended in our study on test image, half black and half white. Contrast was studied in the petition so as to propose several new methods for different contrasts in the edge of images where the results of technical differences would identify contrast image under different lighting conditions.
The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More