Background: Glass ionomer restorations are widely employed in the field of pediatric dentistry. There is a constant demand for a durable restoration that remains functional until exfoliation. This study aimed to measure and compare the effect of a novel coating material (EQUIA Forte Coat) on the microleakage of glass hybrid restoration (EQUIA Forte HT) in primary teeth. Material and method: Thirty cavitated (class-II) primary molars were allocated randomly into two groups based on the coat application; uncoated (control) and coated group (experimental). Cavities were prepared by the use of a ceramic bur (CeraBur) and restored with EQUIA Forte HT with or without applying a protective coat (EQUIA Forte Coat). Samples went through the thermocycling process and dipped in 2% methylene blue dye before being sectioned through the center of the restoration. Microleakage was evaluated digitally using software and a camera connected to a stereomicroscope (30 x magnification) to assess dye penetration of the sectioned samples at both the occlusal and gingival marginal levels. Results: There was a significant difference between the coated and uncoated groups at both occlusal (p=.029) and gingival margin sites (p=.001). Conclusion: Higher microleakage values were associated with the uncoated group compared to the coated one. The application of a protective coating to the restorations is an efficient approach to decrease the microleakage of the restorations that can be usefully adopted in clinical practice.
This study aimed to identify the employment of the social networking platform «Twitter» in the 2016 presidential campaign led by the Republican candidate, Donald Trump; and analyse his tweets through his personal account on «Twitter» for the period from: 10/ 8/2016 to: 11/ 8/2016 which represents the last month of the election campaign.
The study belongs to the type of descriptive studies using the analytical method through an analysis index that includes sub-categories and other secondary categories. The research has adopted the ordinary unit of information material (tweet) as an analysis unit for this purpose.
... Show MoreA new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte
... Show MoreWith growing global demand for hydrocarbons and decreasing conventional reserves, the gas industry is shifting its focus in the direction of unconventional reservoirs. Tight gas reservoirs have typically been deemed uneconomical due to their low permeability which is understood to be below 0.1mD, requiring advanced drilling techniques and stimulation to enhance hydrocarbons. However, the first step in determining the economic viability of the reservoir is to see how much gas is initially in place. Numerical simulation has been regarded across the industry as the most accurate form of gas estimation, however, is extremely costly and time consuming. The aim of this study is to provide a framework for a simple analytical method to esti
... Show MoreThe study aims at showing the effect of basil oil on the sensory properties of the laboratory biscuits. the results show the sensory valuation before and after the storage. the (A4) equation exceeds 15% of T exchange (3 , 4 , 5 g. basil 19 , 55 g . fats )in most of the studied sensuous qualities. Then, the (A5) equation of 20% exchange percentage (4.60g. basil oil + 18.40g. fats). Then, the (A3) equation of 10% exchange percentage (2.30g. basil oil + 20.70g. fats). Then the (A2) equation of 5% exchange percentage (1.5g. basil oil + 21.85g. fats). Finally, the control equation (A1) received the lower value of sensuous evaluation and general acceptance. Abstract differences also appeared at denotation level 0.05 between the (A2)
... Show MoreSummary:
This research revolves around the probing of those whom Ibn Hajar said, "He has a vision", its significance, and the ruling on the connection and transmission to it. The number of narrators reached fifty-one (51) narrators, among whom it was said, “He has a vision, whether it is definite or possibly. Some of them had a vision and companionship.”They are eleven (11) narrators, And among them were those who had visions and had no company, and their number was twenty-one (21) narrators, and among them were those who had no vision and nor company, and their number is nineteen (19) narrators.
As a result , whoever said about him “has a vision” and has companions, his hadith is connected, even i
Mixed convection heat transfer to air inside an enclosure is investigated experimentally. The bottom wall of the enclosure is maintained at higher temperature than that of the top wall which keeps in oscillation motion, whereas the left and right walls are well insulated. The differential temperature of the bottom and top walls changed several times in order to accurately characterize the temperature distribution over a considerable range of Richardson number. Adjustable aspect ratio box was built as a test rig to determine the effects of Richardson number and aspect ratio on the flow behavior of the air inside the enclosure. The flow fields and the average Nusselt number profiles were presented in this wo
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More