Preferred Language
Articles
/
jbcd-532
The effects of various beverages on the shear bond strength of light-cured orthodontic composite (An in vitro comparative study)
...Show More Authors

Background: This study was conducted to assess the effects of various beverages on the shear bond strength of light-cured orthodontic composite used to bond stainless steel orthodontic brackets on human teeth and to determine the site of bonding failure of this material. Materials and Methods: Fifty extracted human premolars were selected and randomly divided into five equal groups each with 10 teeth according to the beverage type (Control, One Tiger, Milk, Green tea and Coffee). After bonding, the teeth were immersed in specific beverages for 5 minutes twice daily with equal intervening intervals then washed and stored in distilled water at 37º C for the reminder of the day. The process was carried out for 30 days. The samples were then tested for shear bond strength using Tinius-Olsen testing machine with a crosshead speed of 0.5mm/minute. For adhesive remnant index, the enamel surface and bracket base of each tooth were inspected under magnifying lens (20X) of a stereomicroscope. Results: Milk, coffee and one Tiger energy drink reduced the shear bond strength of the light-cured composite significantly unlike the green tea. The predominant site of bond failure was between the bracket base and the adhesive leaving the composite on the tooth rather on the brackets base. Conclusions: Orthodontic patients should be instructed to reduce the intake of acidic and fatty beverages to prevent debonding of the orthodontic brackets.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (22)
Crossref (12)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Aware of the roots of the text in the arab heritage
...Show More Authors

Text science presented a set of criteria to make the text essentially a project to create
texts and use. Me and means of cohesion script text scientists, two standard foundries and
knitting. Find this means their equivalent in the Arab rhetorical Heritage has been found, it
means foundries find Accompanying represented (link grammar in the classroom and link),
and referrals represented by (Baldmair, Ldefinition, and the name of the signal), and
deletion, and repetition, and presentation delays. As in the standard knitting it has confirmed
Albulagjun Arabs on the semantic consistency between the text components, as reflected in
the moral link in Chapter interfaces, as well as in moral coherence between parts of the te

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
The effect of negation in proving the pathology of the fundamentalists
...Show More Authors

This research deals with the study of pathways in terms of the negative effect in proving them
And the fact of this influence among fundamentalists.
The research consists of two subjects and a conclusion.
In the first section, I learned about the terms in the title of the research:
Denial and pathology.
In the second section I reviewed the pathways of illness that affect exile in it
Five: the nodding, the fitting, the sounding, the division, the rotation, the inference
A description of the absence of evidence of non-reference to it. And I figured out how
Negation in it by striking some illustrative examples as fruit
Arising from the effect of negation in proving those routes.
As a result of this research, a

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
An experimental cross-section measurement of 10B(n,α)7Li reaction on counting alpha particles track density
...Show More Authors

The present work determines the particle size based only on the number of tracks detected in a cluster created by a hot particle on the CR-39 solid state nuclear track detector and depending on the exposure time. The mathematical model of the cross section developed here gives the relationship between alpha particle emitting from the (n, α) reaction and the number of tracks created and distribution of tracks created on the surface of the track detector. In an experiment performed during this work, disc of boron compound (boric acid or sodium tetraborate) of different weights were prepared and exposed to thermal neutron from the source. Chemical etching is processes of path formation in the detector, during which a suitable etching solut

... Show More
View Publication
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
SDN-RA: An Optimized Reschedule Algorithm of SDN Load Balancer for Data Center Networks Based on QoS
...Show More Authors
Abstract<p>With the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch</p> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Design of an Adaptive PID Neural Controller for Continuous Stirred Tank Reactor based on Particle Swarm Optimization
...Show More Authors

 A particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Lab on-a-chip-based, an integrated microfluidic device lo-cost, rapid, and sensitive analysis of Augmentin
...Show More Authors

Microfluidic devices provide distinct benefits for developing effective drug assays and screening. The microfluidic platforms may provide a faster and less expensive alternative. Fluids are contained in devices with considerable micrometer-scale dimensions. Owing to this tight restriction, drug assay quantities are minute (milliliters to femtoliters). In this research, a microfluidic chip consisting of micro-channels carved on substrate materials built using an Acrylic (Polymethyl Methacrylate, PMMA) chip was designed using a Carbon Dioxide (CO2) laser machine. The CO2 parameters influence the chip’s width, depth, and roughness. To have a regular channel surface, and low roughness, the laser power (60 W), with scanning speed (250 m/s)

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 17 2015
Journal Name
جامعة المستنصرية
study of some aspect on Iraqi children with Atopic Dermatitis
...Show More Authors

Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Adsorption Study of Rhodamine –B Dye on Plant (Citrus Leaves)
...Show More Authors

The current research includes the adsorption of Rhodmine-B Dye on the surface of Citrus Leaves using the technique of UV. Vis spectrophotometer to determine data of quantitative adsorption at various contact time, ionic strength, PH and temperature conditions. As a function of temperatures 25,35,45,55 0C, the dsorption phenomenon was examined, and the results showed that Rhodamine-B adsorption Citrus leaves rose with increasing temperatures on the surface (endothermic process). Using various NaCl solution concentrations, the effect of ionic strength on adsorption has also been studied. Increasing the importance of ionic strength has been shown to improve the amount of adsorption of Rhodamine-B on citrus leaves at constant temp

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The general budget and censorship on it in Iraqi legislation
...Show More Authors

The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from

... Show More
View Publication Preview PDF
Crossref