Background: Restoration of the gingival margin of Class II cavities with composite resin continues to be problematic, especially where no enamel exists for bonding to the gingival margin. The aim of study is to evaluate the marginal leakage at enamel and cementum margin of class II MOD cavities using amalgam restoration and modern composite restorations Filtek™ P90, Filtek™ Z250 XT (Nano Hybrid Universal Restorative) and SDR bulk fill with different restoratives techniques. Materials and method: Eighty sound maxillary first premolar teeth were collected and divided into two main groups, enamel group and cementum group (40 teeth) for each group. The enamel group was prepared with standardized Class II MOD cavity with gingival margin (1 mm above C.E.J) on both box sides. While the cementum group with the gingival margin (1 mm below C.E.J) on both sides. The enamel and cementum groups were then subdivided into eight subgroups for each (five teeth) with 10 boxes for each group. Subgroups within the main group named according to materials and techniques that were used with it as following: Amalgam subgroup (Permite, SDI), SDR subgroup (DENTSPLY) with bulk technique, Filtek™ P90 subgroup (3M ESPE) with three incremental techniques (Oblique, Horizontal and Centripetal technique), and Filtek™ Z250XT subgroup (3M ESPE) with three incremental techniques (Oblique, Horizontal and Centripetal technique).After specimens were stored in distilled water at 37°C for 7 days. All specimens were subjected to thermocycling at (5° to 55 °C). Microleakage was evaluated by stereomicroscope (20 X). Data were analyzed statistically by Kruskal-Wallis test and Mann-Whitney U-test. Result: All experimental groups showed leakage at cementum more than enamel groups. SDR bulk fill subgroup showed the highest marginal leakage among all experimental groups followed by Filtek™ Z250 XT subgroup with horizontal technique at both enamel and cementum groups. Silorane and Filtek™ Z250 XT subgroups with oblique technique showed the least marginal leakage followed by centripetal technique at both enamel and cementum groups. Amalgam restoration subgroup shows lesser leakage than SDR bulk fills subgroup significantly at both enamel and cementum groups. While it show higher leakage than Silorane subgroup with oblique technique significantly at enamel margin only. Conclusion: The limiting factors for marginal leakage are technique and material dependent.
The problem of the research is focused on importance limited of Iraq industrial companies in application of scientific measurements of supply chains performance, The research sought to achieve a group of goals, the most important are , identifying the strengths and weaknesses in the reality of supply chain in General Company for Cotton Industries, The data and information required are gathered from the dependence company, records through the field observations and personal interviews, the research used some quantitative indicators to measure of supply chain performance, The research reached to many conclusions , the most outstanding among them is the existence of a strong inverse correlatio
... Show MoreBackground :Evening preparation for colonoscopy is often unsatisfactory and inconvenient. This study was performed to compare the efficacy of bowel preparation at two different timings: night before and morning of endoscopy and to compare the cecal intubation rate and disturbance of sleep hours between these two groups.
Methods: In this prospective randomized endoscopist- blinded trial, 150 patients were enrolled between March 2010 and August 2011. Patients aged between 18 to 80 years needing colonoscopy were included. Patients with prior bowel surgery, suspected bowel obstruction or those who didn't completely fulfill the preparation instructions were excluded. Patients received polyethyelen glycol electrolyte preparation in a mornin
This study was conducted with the aim to extract and purify a polyphenolic compound “ Resveratrol†from the skin of black grapes Vitis vinifera cultivated in Iraq. The purified resveratrol is obtained after ethanolic extraction with 80% v/v solution for fresh grape skin, followed by acid hydrolysis with 10% HCl solution then the aglycon moiety was taken with organic solvent
( chloroform). Using silica gel G60 packed glass column chromatography with mobile phase benzene: methanol: acetic acid 20:4:1 a
... Show MoreType 2 diabetes mellitus (T2DM) is the most frequent endocrinal disease commonly associated with thyroid disorders .The study is conducted at the Specialized Center for Endocrinology and Diabetes in Baghdad ,during December 2014 up to October 2015.This study was done to investigate the prevalence of anti- thyroid peroxidase (Anti-TPO) antibody in patients suffered from type 2 diabetes with thyroid disorders .The study groups included a total number of 80 subjects consisting of 60 type 2 diabetic patients divided into 20 hyperthyroidism subjects (group 1) ,20 hypothyroidism subjects (group 2), 20 euthyroidism subjects (group 3) and 20 healthy controls (group 4) . The fasting blood samples were analyzed for (T3,T4,TSH) by using Vitek Immuno d
... Show More(January 25, 2011) represented a real opportunity to bring about fundamental changes in Egyptian foreign policy and to start a new phase that would cut off all the negative and problematic aspects of Egyptian politics in the period before the revolution. Through the employment of Egypt's huge balance and the role of historical is a civilization rooted in the roots of thousands of years and Islamic reference represented over more than a thousand years the Islamic medium of religion in the start of vision and tools to achieve the Egyptian national interest, and safeguarding Egyptian national security in its comprehensive sense. The research attempts to answer a central question: Is there a role for Egyptian soft power in the Islamic world
... Show MoreAsset management involves efficient planning of economic and technical performance characteristics of infrastructure systems. Managing a sewer network requires various types of activities so the network can be able to achieve a certain level of performance. During the lifetime of the network various components will start to deteriorate leading to bad performance and can damage the infrastructure. The main objective of this research is to develop deterioration models to provide an assessment tool for determining the serviceability of the sewer networks in Baghdad city the Zeppelin line was selected as a case study, as well as to give top management authorities the appropriate decision making. Different modeling techniques
... Show MoreThe aesthetic and technical expertise help in producing the artistic work and achieving results in aesthetic formulations that reflect the aesthetic and expressive dimensions and the reflective dimensions of the pottery, surpassing its traditions, asserting its active presence in life, cherishing it even when it breaks or get damaged by employing techniques that are originated from the Japanese environment.
The research problem is to study how ( Kintsugi) technique and similar techniques are used to create new rebirths of pottery piec
... Show MoreThe study objectives were to (1) describe the characteristics of the pharmacy professionals and (2) explore the association between job satisfaction and factors, such as work control, work stress, workload and organization and professional commitments.
This study was a cross-sectional design. The survey items were mainly adapted from the US National Pharmacist Workforce Survey. An electronic (Qualtrics) questionnaire was posted on pharmacist social media in several A
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More