Objective: To conduct a standardized method for cavity preparation on the palatal surface of rat maxillary molars and to introduce a standardized method for tooth correct alignment within the specimen during the wax embedding procedure to better detect cavity position within the examined slides. Materials and methods: Six male Wistar rats, aged 4-6 weeks, were used. The maxillary molars of three animals were sectioned in the frontal plane to identify the thickness of hard tissue on the palatal surface of the first molar which was (250-300µm). The end-cutting bur (with a cutting head diameter of 0.2mm) was suitable for preparing a dentinal cavity (70-80µm) depth. Cavity preparation was then performed using the same bur on the tooth surface in the other three animals. Rats are then euthanized before dissecting, fixing, and demineralizing the teeth. For better alignment of teeth samples during the waxing procedure, K-file endodontic instrument size #8 was dipped in Indian ink. The file tip was inserted on the jaw bone at the buccal side of the tooth in a region opposed to the prepared cavity on the palatal side. Moreover, a small Dycal applicator instrument was used to mark the jaw bone on the mesial side of teeth samples as an orientation for the cutting surface. Results: Well-defined sections were obtained with a clear cavity extension within dentin and without any signs of pulp exposure in all samples. Conclusion: This pilot was conducted to perform an easy procedure for cavity preparation in rat molar teeth to obtain a clear histopathological section.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreBackground: Recurrent aphthous stomatitis (RAS) is one of the most common oral mucosal disorders with a prevalence of 50-66%. The prevalence of hematinic deficiencies including ferritin and vitamin B12 deficiencies and their role in the prophylaxis and development of RAS is not well known. Many studies have demonstrated a high prevalence of hematinic deficiencies in patients with RAS. This study aimed to compare the serum level of ferritin and vitamin B12 in patients with recurrent aphthous ulcers and healthy controls. Subjects, Materials and Methods: The data were collected from patients who needed blood analysis to exclude anemia from November 2020 to May 2021. The study was approved by the institutional ethics committee. After recordi
... Show MoreThe research aims to determine the impact of Human Resources Accounting (HRA) on employee’s performance. The research’s problem was embodied in the lack of interest in HRA, which was reflected on the performance of employees in the Ministry of Education; the research adopted the descriptive-analytical approach, and the research community included the directors of departments and people at the headquarters of the Ministry of Education. The sample size was (224) individuals from the total community of 533. The questionnaire was adopted as the main tool for collecting data and information, as well as the interviews that were conducted by the researcher. In order to analyze t
... Show MoreThe dependence of the energy losses or the stopping power for the ion contribution in D- T hot plasma fuels upon the corresponding energies and the related penetrating factorare arrive by using by a theoretical approximation models. In this work we reach a compatible agreement between our results and the corresponding experimental results.
The aim of the research is to shed light on identifying the extent of the university professor's competencies and their roles in managing and training participants in e-training workshops as a pedagogical point view. The research sample consisted of a group of (30) university professors (lecturers) in the training workshops, in scientific,humanitarian and social disciplines, including (12) a university professor (holding a trainer certificate), , the research methodology is descriptive, and the community is a group of trained participants. (115) participated in (40) e-training workshops organized by the Center for Continuing Education at the University of Baghdad (and the selection of workshops within the researcher's specialization in the
... Show Moreلطالما كان انتظار الملأ للخلاص والتي ترتبط بشكل اساسي بال "منتظر" او ال "مخلص" جزءا من الوعي الجمعي الذي تطور ليكون مرتبطا بالنمط البدائي والذي بدوره أصبح مرآةً تنعكس على اساسها فرص الانسان نحو النجاة. في مسرح القرن العشرين, لم تنفك فكرة الانتظار ان ترتبط بمسرحية صاموئيل بيكيت العبثية " في انتظار غودو" كونها مثالا رمزيا بالرغم من انه تجسيد شخصية "غودو" وقعت تحت وطأة الكثير من عمليات التحوير والتغيير في اطاره
... Show More
