Background: This in vitro study evaluated the fracture resistance of weakened endodontically treated premolars with class II MOD cavities restored with different composite restorations (Low-shrinkage Filtek P90, nanohybrid Filtek Z250 XT and SDR bulk fill). The type and mode of fracture were also assessed for all the experimental groups. Materials and Method: Fifty human adult maxillary premolar teeth were selected for this study. Standardized extensive class II MOD cavities with endodontic treatment were prepared for all teeth, except those that were saved as intact control. The teeth were divided into five groups of ten teeth each (n=10): (Group 1) intact control group, (Group 2) unrestored teeth with endodontic treatment, (Group 3) restored with (Filtek Z250 XT), (Group 4) restored with SDR bulk-fill flowable composite and (Group 5) restored with Filtek P90 composite. All specimens were subjected to compressive axial loading until fracture in a universal testing machine. The data were statistically analyzed using one-way ANOVA test and LSD test. Macroscopic fracture type were observed and classified into favorable and unfavorable. Specimens in group 3, 4 and 5 were examined by stereomicroscope at a magnification of 20× to evaluate the mode of failure into adhesive, cohesive or mixed. Results: The mean fracture load was (1.123 Kn) for group 1, (0.545 Kn) for group 2, (0.687 Kn) for group 3, (0.799 Kn) for group 4 and (0.672 Kn) for group 5. Using one way ANOVA test a highly significant difference (P < 0.01) were found among all groups. The use of bulk-fill flowable composite improved the fracture resistance significantly in comparison to silorane and non-significantly to Filtek Z250 XT. Filtek Z250 XT showed better improvement in fracture resistance but with no significant differences in comparison to Filtek P90 composite restorations. The type of failure was unfavorable for all the restored groups. Conclusion:All experimental composite restorations showed significant improvement in the resistance to cuspal fracture in comparison to unrestored one. However, under the conditions of this study, direct composite restorations should be considered as a valid interim restoration for weakened endodontically treated teeth before cuspal coverage can be provided.
The study aims to clarify the impact of growth in the industrial sector on economic growth in the Iraqi economics according to the methodology of Kaldor for (2017-2030) , taking into consideration the effect of the accumulation of capital in the calculation of growth rates in the economy through productivity estimate of Total Factor Productivity (TFP) to growth in the economy, which is why the study assumes a formula to comply with the laws of Kaldor growth models developed requirements. This study is the most important to find out the development of the laws of Kaldor among Arabic studies, especially the first and third, so that the relationship between the growth of industrial production and economic growth as represented
... Show MoreThe aim of this research is to study the optical properties of carbon-magnesium plasma resulting from arc discharge with explosive wire technique, where the energy gap of each of carbon and magnesium and the carbon-magnesium bond for three values of the wire exploding current (50,75,100 amperes) was studied. It was found that the energy gap for each of carbon and magnesium decreases with increasing the current, the X-ray diffraction of magnesium and the carbon-magnesium suspension was studied, and FTIR of the carbon-magnesium suspended carbon was studied for three values of the exploding current (50, 75, 100 amperes) and the type of bonds for carbon and magnesium was determined. To ob
A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreThe present study aimed to identify the exact location and its relation to cognitive
method (risk_caution) to university students. The sample consisted of (300) students who
were chosen randomly and equally. The study results indicated that students possess an
internal exact location and they also use risk cognitive method. The study also indicated that
there is a prophesies which is an exact location for others to reach to caution cognitive
method. Depending on these results, the study recommended to benefit from the results of the
study variables and from the measurement of the exact location and method of cognitive
(risk_caution) to identify male and female students and especially by consulting units at
college
Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro
... Show MoreIn the present paper, the researcher attempts to shed some light on the objective behind inserting some Qur'anic verses by Al-Zahraa (Peace Be Upon Her) in her revered speech. Besides, it tries to investigate the hidden meaning of these verses and to study them in the light of pragmaticreferences. This task is supported by Books of Tafseer as well as the books that explained this speech to arrive at its intended meaning. It is possible say that this is astep towards studying speeches of 'Ahlul Bayt' (People of the Prophet's household) in terms of modern linguistic studies, as well as employing modern methods to explore the aesthetic values of these texts.
Seeds, beans, leaves, fruit peel and seeds of five plants (Ferula assa-foetida, Coffea robusta, Olea europaea, Punica granatum and Vitis vinifera, respectively) were extracted with four solvents (distilled water, 80% methanol, 80% acetone and a mixed solvent that included methanol, ethanol, acetone and n-butanol at proportions 7:1:1:1). Such manipulation yielded 20 extracts, which were phytochemically analyzed for total polyphenols (TP) and flavonoids (TF). The DPPH (2,2-diphenyl-1-picrylhydrazyl) radical scavenging activity (RSA) and DPP-4 (dipeptidyl peptidase-4) relative inhibition activity (RIA) were also assessed for each extract. The results revealed that mixed solvent extract of V.
... Show MoreThis research was aimed to the purification and characterization of cytosine deaminase as a medically important enzyme from locally isolated Escherichia coli; then studying its cytotoxic anticancer effects against colon cancer cell line. Cytosine deaminase was subjected to three purification steps including precipitation with 90% ammonium sulfate saturation, ion exchange chromatography on DEAE-cellulose column, and gel filtration chromatography throughout Sephadex G-200 column. Specific activity of the purified enzyme was increased up to 9 U/mg with 12.85 folds of purification and 30.85% enzyme recovery. Characterization study of purified enzyme revealed that the molecular weight of cytosine deaminase produced by E. coli was about 48 KDa,
... Show More