Background: Restoration of the gingival margin of Class II cavities with composite resin continues to be problematic, especially where no enamel exists for bonding to the gingival margin. The aim of study is to evaluate the marginal leakage at enamel and cementum margin of class II MOD cavities using amalgam restoration and modern composite restorations Filtek™ P90, Filtek™ Z250 XT (Nano Hybrid Universal Restorative) and SDR bulk fill with different restoratives techniques. Materials and method: Eighty sound maxillary first premolar teeth were collected and divided into two main groups, enamel group and cementum group (40 teeth) for each group. The enamel group was prepared with standardized Class II MOD cavity with gingival margin (1 mm above C.E.J) on both box sides. While the cementum group with the gingival margin (1 mm below C.E.J) on both sides. The enamel and cementum groups were then subdivided into eight subgroups for each (five teeth) with 10 boxes for each group. Subgroups within the main group named according to materials and techniques that were used with it as following: Amalgam subgroup (Permite, SDI), SDR subgroup (DENTSPLY) with bulk technique, Filtek™ P90 subgroup (3M ESPE) with three incremental techniques (Oblique, Horizontal and Centripetal technique), and Filtek™ Z250XT subgroup (3M ESPE) with three incremental techniques (Oblique, Horizontal and Centripetal technique).After specimens were stored in distilled water at 37°C for 7 days. All specimens were subjected to thermocycling at (5° to 55 °C). Microleakage was evaluated by stereomicroscope (20 X). Data were analyzed statistically by Kruskal-Wallis test and Mann-Whitney U-test. Result: All experimental groups showed leakage at cementum more than enamel groups. SDR bulk fill subgroup showed the highest marginal leakage among all experimental groups followed by Filtek™ Z250 XT subgroup with horizontal technique at both enamel and cementum groups. Silorane and Filtek™ Z250 XT subgroups with oblique technique showed the least marginal leakage followed by centripetal technique at both enamel and cementum groups. Amalgam restoration subgroup shows lesser leakage than SDR bulk fills subgroup significantly at both enamel and cementum groups. While it show higher leakage than Silorane subgroup with oblique technique significantly at enamel margin only. Conclusion: The limiting factors for marginal leakage are technique and material dependent.
The aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor
... Show MoreThis research discussed and analyzed the formulation of a strategy to manage tax compliance risks, as an applied research in the General commission for Taxes. The questionnaire was used as a research tool to identify the factors that stimulate or retard the research sample from being compliant. The K-means clustering method was also used to enable the classification of the research sample's views into four behaviors, some of these views pose tax-compliance risks. The research concluded that risk management is a continuous process and that all departments of the General commission for Taxes are responsible for its implementation to enable them to deal with the behavior of the taxpayer towards tax compliance. And it recommended
... Show MoreThe proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.
In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete
... Show MoreThe results show that the compound affects the rest of the living cells after treatment for 15 minutes The influence Almtafr has had the effect BU less than the effect of NTG in the case of the registration of every of Struptomaysan resistance and rifampicin, although the first attribute more responsive
The developments accelerated in technology and rapid changes in the environment and increase numbers industrial countries and different desires and requirements of customers, lead to be produced in large quantities is not feasible due to changes listed above as well as the need to product variety and change in tastes and desires of consumers, all above led not to enable companies to discharge their products in the case of mass production and created the need to devise ways and new methods fit with the current situation, and accounting point no longer the traditional accounting systems able to meet the requirements needed by the companies to make decisions and know where waste and loss of resources resulting to invent new style away from
... Show MoreThe use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreThe aim of this study was to identify the level of critical thinking skills among fourth-grade middle school students and to determine the performance level of the underhand volleyball pass, with the assumption that there is a positive relationship between critical thinking and skill performance. The study population included 281 students from Basra Preparatory School for Girls under the Second Baghdad Education Directorate for the 2024/2025 academic year, of whom 275 students were intentionally selected as the research sample (97.865% of the population). The experimental procedure involved applying a critical thinking scale and a technical performance test for the underhand pass on 25 students per day over 11 days, from February 9
... Show MoreThe researcher attempts to diagnose the level of the effect of strategic thinking skills (intuition, meditation, creativity) of the managers in the Ministry of Health in Iraq and some of its institutions in the formulation of human resources management: (selection, training, incentivence , performance appraisal (Recognizing the importance of the subjects studied, and because of the importance of the expected results of th
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show More