Background: Glass ionomer restorations are widely employed in the field of pediatric dentistry. There is a constant demand for a durable restoration that remains functional until exfoliation. This study aimed to measure and compare the effect of a novel coating material (EQUIA Forte Coat) on the microleakage of glass hybrid restoration (EQUIA Forte HT) in primary teeth. Material and method: Thirty cavitated (class-II) primary molars were allocated randomly into two groups based on the coat application; uncoated (control) and coated group (experimental). Cavities were prepared by the use of a ceramic bur (CeraBur) and restored with EQUIA Forte HT with or without applying a protective coat (EQUIA Forte Coat). Samples went through the thermocycling process and dipped in 2% methylene blue dye before being sectioned through the center of the restoration. Microleakage was evaluated digitally using software and a camera connected to a stereomicroscope (30 x magnification) to assess dye penetration of the sectioned samples at both the occlusal and gingival marginal levels. Results: There was a significant difference between the coated and uncoated groups at both occlusal (p=.029) and gingival margin sites (p=.001). Conclusion: Higher microleakage values were associated with the uncoated group compared to the coated one. The application of a protective coating to the restorations is an efficient approach to decrease the microleakage of the restorations that can be usefully adopted in clinical practice.
Blades of gas turbine are usually suffered from high thermal cyclic load which leads to crack initiated and then crack growth and finally failure. The high thermal cyclic load is usually coming from high temperature, high pressure, start-up, shut-down and load change. An experimental and numerical analysis was carried out on the real blade and model of blade to simulate the real condition in gas turbine. The pressure, temperature distribution, stress intensity factor and the thermal stress in model of blade have been investigated numerically using ANSYS V.17 software. The experimental works were carried out using a particular designed and manufactured rig to simulate the real condition that blade suffers from. A new cont
... Show MoreBackground: Postoperative morbidity after extraction of the impacted mandibular third molar (IMTM) is inevitable. One of the most common postoperative complication is alveolar osteitis (AO) which is a painful non healed socket. Many researches were attempted to prevent the occurrence of AO by introducing and applying a new materials inside the extraction socket. Platelet rich fibrin (PRF) is a biological complex fibrin matrix where autologous platelets and leucocytes are present, used to enhance tissue healing process and reduce the early adverse effects of the inflammation. Aims: To evaluate the effect of PRF on the incidence of AO. Also to assess PRF effect on pain, swelling, and trismus following the surgical removal of IMTM and
... Show MoreBackground: Postoperative morbidity after extraction of the impacted mandibular third molar (IMTM) is inevitable. One of the most common postoperative complication is alveolar osteitis (AO) which is a painful non healed socket. Many researches were attempted to prevent the occurrence of AO by introducing and applying a new materials inside the extraction socket. Platelet rich fibrin (PRF) is a biological complex fibrin matrix where autologous platelets and leucocytes are present, used to enhance tissue healing process and reduce the early adverse effects of the inflammation. Aims: To evaluate the effect of PRF on the incidence of AO. Also to assess PRF effect on pain, swelling, and trismus following the surgical removal of IMTM and compa
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreImage compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre
... Show MoreThe characters of facades' form of the Iraqi building after 2003 have been changed, it has been described by many names. The problem of the research is that what are the features of the characters of the form in the façades of the buildings in Baghdad city after 2003? Are the façade of the individual houses or the commercial buildings is the heaviest in the visual weight? The research aims to answer those questions by choosing the vernacular architecture as a measurement tool. It is the informal image of the architecture, which is built by people informally and spontaneously, without official control and legislation to be organized. This is smellier to what has happened in Baghdad, after 2003 according to previous stud
... Show MoreThe present study identifies the linguistic means used to realize hyperbole in poetry as a rhetorical device that makes readers experience the beauty of poetic language. To achieve the aim of the study, a model of analysis in accordance with Spitzbardt (1963), Norrick (1982), and McCarthy & Carter (2004) is used. The analysis of data under investigation reveals that hyperbole is a crucial aid used by poets to portrait the real world as imaginative. In conclusion, poets prefer using lexico-grammatical repertoires than lexico-grammatical configurations. Keywords
Welcome to International Journal of Research in Social Sciences & Humanities (IJRSSH). It is an international refereed journal of Social Sciences, Humanities & Linguistics in English published quarterly, both print and online.
This research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to
The research's aim is to place two teaching methods ( total and analytical method) and to know which one of them is better than the other in teaching the counter-attack with Epee. The researchers have used the experimental method for being considered suitable to solve the problem of the research. The sample of the research includes third –stage female students of college of physical education and sport sciences / Baghdad University in the subject of fencing, their number amounted 60 female students. It has been used SPSS for processing the results. They have concluded that the two groups of the research and the two methods (( total and analytical) have learnt the counter- attack of the two over mentioned groups. they have recommended to c
... Show More