Background: This study compared in vitro the marginal adaptation of three different, low shrink, direct posterior composites Filtek™ P60 (packable composite), Filtek™ P90 (Silorane-based composite) and Sonic fill™ (nanohybrid composite) at three different composite/enamel interface regions (occlusal, proximal and gingival regions) of a standardized Class II MO cavity after thermal changes and mechanical load cycling by scanning electron microscopy. Materials and methods:Thirty six sound human maxillary first premolars of approximately comparable sizes were divided into three main groups of (12 teeth) in each according to the type of restorative material that was used: group (A) the teeth were restored with Filtek™ P60 and single bond™ Universal adhesive using horizontal incremental technique, group (B)the teeth were restored with Filtek™ P90 and P90 system adhesive using horizontal incremental technique and group (C) the teeth were restored with Sonic fill™ composite and single bond™ Universal adhesive using bulk technique.After specimens were stored in distilled water at 37°C for 7 days, all specimens were subjected to thermocycling at (5° to 55 °C), then submitted to mechanical load cycling (intermittent axial force of 49N and a total of 50.000 cycles). The specimens were observed under scanning electron microscope at (2000 X) to measure marginal gap width (the distance between the dental wall and the restoration) at occlusal, proximal and gingival regions in micrometer using Tescan software, version 3.5. Data were analyzed statistically by one way ANOVA test and least significant difference tests. Results:The results showed that the silorane-based posterior composite (Filtek™ P90) showed significantly the least marginal gap width at the occlusal, proximal and gingival regions after the application of thermal changes and mechanical load cycling in comparison to the two methacrylate-based posterior composite Filtek™ P60 (packable) and the Sonic fill™ (nano-hybrid). Sonic fill™ bulk fill composite that relied on the vibration concept to lower the viscosity of high filler loaded composite material showed significantly lesser marginal gaps width at occlusal, proximal and gingival composite/enamel interface regions in comparison with Filtek™ P60 (packable composite) using horizontal incremental technique. The silorane-based composite (Filtek™ P90) showed non-significant difference in marginal gaps width at the three different regions. While, both methacrylate based Filtek™ P60 and Sonic fill™ composite showed significantly lesser marginal gap width at the occlusal region in comparison with gingival regions. Conclusion: None of the low-shrinkage composite restorative materials tested in this study totally prevented micro-gap formation at composite/enamel interfaces of Class II MO cavity.
With the increasing prevalence of breast cancer among female internationally, occupies about 25% of all cases of cancer, with a measured 1.57 million up to date cases in 2012. Breast cancer has turn a most warning to health of female in Iraq, where it is the major cause of death among women after cardiovascular diseases, with a mortality rate of 23% related cancer. Recently there is a crucial requirement to include community pharmacists in health elevation activities to support awareness and early diagnosis of cancer, specially breast cancer. The aim of this study is to assess knowledge, attitude and perceived barriers amongst Iraqi community pharmacists towards health promotion of breast cancer. This study is cross sectional research. A
... Show MoreThe importance of this study of the growing importance of perception of touch and its association with the job performance of industrial product since the perception stereotactic means he means practiced by the individual through job performance and has assets of knowledge in the mind of the user and require him to mind the capabilities and knowledge cognitive following their individual focus Zhennea.oanfalh following their enthusiasm when using Sense of touch. The study in the first chapter of the research problem to reveal the role played by the process of cognition and its relationship with the touch function of the industrial product and the associated defect in performance and harder to use. The study also pointed to the research ob
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSinging has significant importance being a major basis for the expressive and cultural production of the societies and a real companion that reflects their artistic career and is strongly connected to the reality of the peoples and the production of the individuals, who are geniuses of arts and culture.
Rural singing represents one of the most well-known artistic singing styles in Iraq, which truly embodied the Iraqi national identity. However, it remained confined to the countryside and did not spread due to the lack of mass media and the recording technologies at that time. It has been pure virgin singing art. The theoretical framework is divided into three axes:
• The Iraqi singing heritage in the twentieth century, a hi
... Show More