ABSTRACT Purpose: the aim of this in vitro study was to compare the marginal gap and internal fitness between single crowns and the crowns within three-unit bridges of zirconium fabricated by CAD-CAM system. Materials and methods: A standard model from ivoclar company was used as a pattern to simulate three-units bridge (upper first molar and upper first premolar) as abutments used to fabricate stone models, eight single crowns for premolar and eight of three units bridges. Crowns and bridges fabricated by CAD-CAM system were cemented on their respective stone models then sectioned at the mid-point buccolingaully and misiodistaly and examined under stereomicroscope. Result: the marginal gap in premolar crowns and premolar within bridge were within the acceptable value 120µm, one –way ANOVA showed that there was significant differences in the internal gaps among the areas. Independent t- Test showed there was significant differences between the premolar crowns and premolar crowns within bridges in marginal opening and cusp tip (lingually and distally) Conclusion: the marginal and internal gaps were in the bridge higher than those in the crowns. The areas of sloped surfaces such as chamfer area, occlusal area and cusp tip had high gap values in comparison with areas of flat surfaces such as axial wall and when the surface area of abutment increased, the marginal and internal gaps of abutment was increase.
The adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla
... Show MoreTo identify and explore the factors nurses perceive as influencing their knowledge acquisition in relation to diabetes care and its management in Saudi Arabia.
Diabetes continues to pose major healthcare challenges despite advances in diabetes management. Nurses have a crucial role in diabetes care, but diabetes knowledge deficits deter effective collaboration with other healthcare providers in educating patients about diabetes self‐management.
An exploratory descriptive qualitative design.
ABSTRACT: BACKGROUND: Estrogens has traditionally been known as the female hormone, but this idea has been challenged in early 1990’s and an essential physiological role for estrogen in male fertility was identified. Phytoestrogens are naturally occurring non-steroidal plant chemicals that can act like the female hormone estrogen. The herbs ( anise alfalfa and vervain ) chosen in this study contain phytoestrogens. OBJECTIVE: Previous studies demonstrated controversy of the effects of phytoestrogens on the rat testes .Hence, the present investigation was undertaken to investigate the influence of typical dose of herbs containing phytoestrogen on the rat testis. MATERIALS AND METHODS: Twenty-four apparently normal mature male rats we
... Show MoreIn spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya
The current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show MoreNon-steroidal anti-inflammatory drugs (NSAIDs) contain free –COOH which thought to be responsible for the GI irritation associated with all traditional NSAIDs. The esterification of this group is one of an approach to ultimate aim for reduce the gastric irritation; so in this study we synthesized and preliminarily evaluated new ester compounds as new analogues with expected selectivity toward COX-2 enzyme. Synthetic procedures have been successfully developed for the generation of the target compounds (III a and b). The synthetic approach involved multi-steps procedures which include: Synthesis of 4-hydroxy benzene sulphonamide ( I b ), synthesis of Naproxen and Ibuprofen acyl chloride and then reacting them with 4-hydroxy benzene sulphon
... Show More