Objective: The aim of this study was to assess the knowledge and attitude of Iraqi dentists towards cone beam computed tomography (CBCT) applications in endodontics by using an online survey. Materials and Methods: A questionnaire, consisting of 31 questions, targeted general dental practitioners and specialists in different dental specialities. A total of 306 participants were included. Data were assessed according to the frequency of distribution and the chi-square test was applied to analyse the difference in responses between two independent groups. Results: Among the participants 63.4% were using digital radiography in their daily practice, and 84% had awareness about CBCT's uses, with higher statistically significant responses among endodontists. About 51.4% of participants gained their CBCT knowledge from lectures, while 79.4% believed that continuous education courses enhance knowledge of CBCT. Nearly 75% of participants agreed on the accuracy of CBCT rather than periapical radiography in detecting endodontic conditions. However, most participants responded that CBCT would be used selectively in their future routine practice. Conclusions: This questionnaire showed that Iraqi dentists have a very good knowledge regarding indications and limitations of CBCT in endodontics. However, there is a lack of structured teaching and practical training on the use of CBCT within dental schools. The development of CBCT training programmes and increasing the availability of CBCT machines within dental schools are strongly supported by the results of this survey
Diyala River is one of the important rivers that provide water for the Governorate of Diyala. In this research, the morphology and sediment transport of this river were studied using HEC-Ras software. The selected length of the river in the present study is 193 km and extended from Diyala Weir to the confluence of Tigris River and Diyala River. The fieldwork period extended from June 2020 till August 2020, where suspended-load and bed-load samples were collected and surveyed some cross-sections. The one-dimensional sediment transport model has been calibrated for five years, from 2014 to 2019. The results were compared with the measured cross-sections in 2019, and the suitable value of (maximum depth
... Show MoreThis qualitative study was conducted on eight types of commercial baking yeast which available in local markets to estimate their fermentation activity as affecting the Bread industry and the impact of the salt added to DoughLeavening, The results showed a great variation in the fermentation capacity of yeast samples (their role in swelling the dough), most notably the sample value Y3 and least sample Y7 and reached 80% and 20% respectively, and the value of Leavening by using the two types of yeast with addition of three levels of salt (0 , 1 and 2%) have 20.0 , 19.7 and 15.7 of the sample Y3, compared with 10.5 , 10.3 and 8.8 of the sample Y7 for each of the levels of salt respectively, reflect
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
In this work a novel drug delivery system through modification of poly acrylic acid with Methionine as a spacer between the poly acrylic acid which was converted to its acyl chloride and reacted with Methionine as spacer unit which has been reacted with Ampicillin drug. In vitro drug release study had been conducted successfully in basic medium in pH 7.4 and acidic medium in pH 1.1 at 37?. Due to many problems associated with drug release and, this modification could decrease the side effect of drug. The prepared prodrug polymer was characterized by spectra method [FTIR and 1H?NMR]. Physical properties and intrinsic viscosity of drug polymer were determined. The good results were obtained in the presence of spacer unit with compar
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based
... Show More