Preferred Language
Articles
/
jbcd-3309
In vitro assessment of bracket adhesion post enamel conditioning with a novel etchant paste
...Show More Authors

Background: 37% phosphoric acid (PA) is the traditional enamel etching technique prior to bracket ‎adhesion, yet it has been implicated in numerous enamel injuries. The purpose of the current study was to create a calcium phosphate (CaP) etching paste in a ‎‎simplified capsule ‎formula that can underpin clinically ‎adequate bracket bond strength ‎without jeopardizing the ‎integrity of enamel upon ‎the debracketing procedure. Materials and Methods: micro-sized hydroxyapatite (HA) powder was mixed with 40% PA solution to prepare ‎experimental acidic CaP paste. Sixty human premolars were ‎assigned into two groups of 30 each. ‎Enamel conditioning was accomplished using 37% PA-gel‎ for control group and CaP paste for experimental group. Each group was further divided into two subgroups regarding the water storage (WS) period (24 h and 30 days). Shear bond strength (SBS) test conducted with examination of debonded surfaces for adhesive remnants and enamel damage using a digital microscope. Results: CaP paste produced significantly lower SBS values than PA (p < 0.01), yet sufficient for clinical use. PA etching caused often cracked enamel surfaces with excessive ‎retention of adhesive remnants (mainly ARI scores 2 and 3). Contrarily, enamel treated with the experimental CaP paste exhibited smooth, ‎unblemished surfaces mostly clean of adhesives residues (scores 0 and 1). Conclusion: a newly developed CaP paste in a capsule formula fosters ‎clinically adequate bracket ‎adhesion with a sustained bonding performance, allows a harmless bracket removal with ‎minimal or no adhesive residues on debonded surfaces; thus, it can be introduced as a suitable ‎alternative to PA‎.  

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
F1000research
In-depth assessment of Iraqi physicians' adherence to treatment guidelines for different diseases: a qualitative study
...Show More Authors

Background: In healthcare settings, specialists from different fields may follow the most well-known, reliable, and easy-to-understand medical guidelines. This study aimed to determine Iraqi physicians' adherence to treatment guidelines, to specify which treatment guidelines are utilized for each disease and identify their barriers to follow the guidelines.

Methods: This was qualitative study including face-to-face and virtual semi-structured interviews with specialist physicians from different disciplines. The interviews were conducted between December 2021 and May 2022 in Kirkuk province, Iraq. The qualitative data generated through i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Assessment &lt;b&gt;&lt;/b&gt;of Serum P53 Protein Level in Adult Patients with Acute Myeloid Leukemia in Correlation with Response to Treatment
...Show More Authors

Background: Acute myeloid leukemia (AML) is an adult leukemia characterized by rapid proliferation of undifferentiated myeloid precursors, leading to bone marrow (BM) failure and impaired erythropoiesis. The p53 tumor suppressor protein regulates cell division and inhibits tumor development by preventing cell proliferation of altered or damaged DNA. It orchestrates various cellular reactions, including cell cycle arrest, DNA repair, and antioxidant properties. Objectives: To investigate the relationship of P53 serum level with hematological findings, remission, and survival status in de novo AML patients. Methods: This is a cross-sectional study that enrolled 63 newly diagnosed de novo AML patients, and 15 sex- and age-matched healt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (19)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
Assessment of Pro Hepcidin and Related with Iron Profile on Hemodialysis Men Patients
...Show More Authors

Patients with renal failure in the final stages undergo the treatment by hemodialysis. Hemodialysis is used to reinstate the intracellular and extracellular fluid environment, by propagation of molecules in solution through a semipermeable membrane along an electrochemical concentration gradient. Blood catching in the dialysis machine and the recurrent phlebotomy may lead to losing about 1-3 g of iron per year. Prohepcidin hormone is an acute phase protein (type II) that plays a major role in the systemic iron irregularities as it is a mediator of anemia in inflammation and regulator of iron metabolism. This study aims to evaluate the effect of hemodialysis on iron hemostasis and its relationship with prohepcidin as an inflammatory mark

... Show More
View Publication Preview PDF
Crossref (1)
Crossref