Tooth restoration one of the most common procedures in dental practice. The replacement of the entire restoration leads to loss of tooth structure and increase risk of pulp injury; replacement is also time consuming and costly. According to the minimally invasive approach when minimal defects, repair is the better choice than the total replacement of the restoration. This study aims to evaluate repair rating versus replacement treatment procedure for defective composite fillings among Iraqi dentists. Material and methodology: A questionnaire survey were designed and distributed to 184 post-graduate dentists in Iraq. The inquiry pertained general information; including their clinical experience in years, their preference in terms of direct composite restoration, repair or replacement of old restorations, whether they taught the indications for repair, and the selection type of composite for repair. Result of 200 questioner’s disrepute, 184 questionnaires were completed and collected. The data revealed that the respondents with 1-5, 6-15 and16-25 years of experience were 62 (33.7%), 75 (40.8%), and 47(25.5%) of total respondents, respectively. The total 174 dentists (94.6%) prefer using tooth-colored restorations and 10 (5.4%) dislike this approach. Result clearly indicate that most of the dentists choose replacement for any fractured or discolored restorations. The data showed that 59.2% of dentist are not familiar with repair, and 40.8% dentists are familiar. The result revealed that 82.1% the dentists were not trained on repair during their undergraduate study. Generally, they had no ideal standard to replace or repair depending on their clinical experience. Therefore, clear criteria and guidelines for replacing and repairing should be developed and followed in post-graduate courses.
Medicine is one of the fields where the advancement of computer science is making significant progress. Some diseases require an immediate diagnosis in order to improve patient outcomes. The usage of computers in medicine improves precision and accelerates data processing and diagnosis. In order to categorize biological images, hybrid machine learning, a combination of various deep learning approaches, was utilized, and a meta-heuristic algorithm was provided in this research. In addition, two different medical datasets were introduced, one covering the magnetic resonance imaging (MRI) of brain tumors and the other dealing with chest X-rays (CXRs) of COVID-19. These datasets were introduced to the combination network that contained deep lea
... Show MoreThe research aims present to highlight the importance of creating construction Organizational appropriate to achieve strategic success and reduce many of the negative effects experienced by organizations has been developing his questionnaire especially so was distributed to a sample of workers in the Asia-cellular as sample included (60) responsive 0 and can embody intellectual dilemma following questions (What are the dimensions of the organizational infrastructure, and what are the justifications for carrying out the reform and development cleared the organizational structure to make it more flexible) to contribute to the achievement of the strategic requirements for success of the organization surveyed.
Find recommended a number o
Imaging by Ultrasound (US) is an accurate and useful modality for the assessment of gestational age (GA), estimation fetal weight, and monitoring the fetal growth during pregnancy, is a routine part of prenatal care, and that can greatly impact obstetric management. Estimation of GA is important in obstetric care, making appropriate management decisions requires accurate appraisal of GA. Accurate GA estimation may assist obstetricians in appropriately counseling women who are at risk of a preterm delivery about likely neonatal outcomes, and it is essential in the evaluation of the fetal growth and detection of intrauterine growth restriction. There are many formulas are used to estimate fetal GA in the world, but it's not specify fo
... Show MoreAAA AL-NUAIMY, MH ABDLL-ABASS, Iraqi Journal of Agricultural Sciences, 2007
Background: This study aimed to determine the gender of a sample of Iraqi adults using the mesio-distal width of mandibular canines, inter-canine width and standard mandibular canine index, and to determine the percentage of dimorphism as an aid in forensic dentistry. Materials and methods: The sample included 200 sets of study models belong to 200 subjects (100 males and 100 females) with an age ranged between 17-23 years. The mesio-distal crown dimension was measured manually, from the contact points for the mandibular canines (both sides), in addition to the inter-canine width using digital vernier. Descriptive statistics were obtained for the measurements for both genders; paired sample t-test was used to evaluate the side difference of
... Show MoreIndustrial effluents loaded with heavy metals are a cause of hazards to the humans and other forms of life. Conventional approaches, such as electroplating, ion exchange, and membrane processes, are used for removal of copper, cadmium, and lead and are often cost prohibitive with low efficiency at low metal ion concentration. Biosorption can be considered as an option which has been proven as more efficient and economical for removing the mentioned metal ions. Biosorbents used are fungi, yeasts, oil palm shells, coir pith carbon, peanut husks, and olive pulp. Recently, low cost and natural products have also been researched as biosorbent. This paper presents an attempt of the potential use of Iraqi date pits and Al-Khriet (i.e. substances l
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More