Objective: The aim of this study was to assess the knowledge and attitude of Iraqi dentists towards cone beam computed tomography (CBCT) applications in endodontics by using an online survey. Materials and Methods: A questionnaire, consisting of 31 questions, targeted general dental practitioners and specialists in different dental specialities. A total of 306 participants were included. Data were assessed according to the frequency of distribution and the chi-square test was applied to analyse the difference in responses between two independent groups. Results: Among the participants 63.4% were using digital radiography in their daily practice, and 84% had awareness about CBCT's uses, with higher statistically significant responses among endodontists. About 51.4% of participants gained their CBCT knowledge from lectures, while 79.4% believed that continuous education courses enhance knowledge of CBCT. Nearly 75% of participants agreed on the accuracy of CBCT rather than periapical radiography in detecting endodontic conditions. However, most participants responded that CBCT would be used selectively in their future routine practice. Conclusions: This questionnaire showed that Iraqi dentists have a very good knowledge regarding indications and limitations of CBCT in endodontics. However, there is a lack of structured teaching and practical training on the use of CBCT within dental schools. The development of CBCT training programmes and increasing the availability of CBCT machines within dental schools are strongly supported by the results of this survey
The present study was conducted to determined the action of several levels of cytokinis (N6-benzyladenine (BA), 6-furfurylaminopurine (kinetin), N6-(∆-isopentyladenine) (2,ip) on buds proliferation of Phoenix dactylifera L..3 ml explants of the heart of 3 years old offshoot were cultured on Murashige and Skoog medium (1962) containing 3 mg/L activated charcoal, 10 mg/L Naphthalene acetic acid proposed by (1) as a control. Other explants were cultured on this medium supplemented with 0.1, 0.5, 1 mg/L BA. 0.1, 0.5, 1, 2, 3, 4 mg/L Kinetin. 0.1, 0.5, 1 mg/L 2,ip. Best number of buds proliferated has occurred on control medium containing 3 mg/L. 2ip.
Abstract:
This research to monitor the features of the historical method in the
thought of a linguistic scientist is known (ibin genieD. 392 AH by offering a
range of grammatical rules presented in his book (the properties and the
nature of their treatment on the basis of the historical method in accordance
with These are an important milestone in facilitating the grammatical rules and
display image "makes it more suitable for the social reality
Abstract
The term public budget defects became nowadays a chronic, economical phenomenon, almost all the countries weather advanced or development country suffered from it, despite the different visions to economic schools of a thought to accept or reject the deficit in public budget but the prevailed opinion that is needed to rule the role of the state by reducing the public spending which led to continuous deficits in public budget and the consequent upon increase in government borrowing, increase taxes on income and wealth, thus weakening the in contrive for private investment which contributed to the increase of in flationary stagnation, it became a duty to state covered by the lack of financial sources
... Show MoreThis study aims to focus on the Motives behind volunteer work among a sample of volunteers working in civil society organizations and check if there are statistical differences with those variables according to (gender, age, job, period of volunteer work, and residence. The sample consists of (220 )volunteers,(189) male and(31) female from southern, northern and central governorate .The Volunteer Functions Inventory(VFI)(Clary & et al,1989)was applied, It consisting of(30) items with six fields( Values, Understanding, Social motives, Career, Protective, Enhancement).
The results show that the most common and important motivations are (Values, Understanding, and social motivations), there are differenc
... Show MoreTechnological development in the last years leads to increase the access speed in the internet networks that allow a huge number of users watching videos online.
Video streaming important type in the real-time video sessions and one of the most popular applications in networking systems. The Quality of Service (QoS) techniques give us indicate to the effect of multimedia traffic on the network performance, but this techniques do not reflect the user perception. Using QoS and Quality of Experience (QoE) together can give guarantee to the distribution of video content according to video content characteristics and the user experience .
To measure the users’ perceptio
... Show MoreFace recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima
... Show More