Objective: This study evaluated the effect of immediate dentin sealing on the marginal adaptation of lithium disilicate overlays with three different types of resin-luting agents: preheated composite, dual-cure adhesive resin, and flowable composite. Materials and Methods: Forty-eight maxillary first premolars of similar size were prepared with a butt joint preparation design. The teeth were separated into two primary groups, each with twenty-four teeth: Group DDS: Delay dentin sealing (non-IDS) teeth were not treated. Group IDS: dentin sealing was applied immediately after teeth preparation. Each group was subsequently separated into three separate subgroups. Subgroups (DDS+Phc, IDS+Phc): cemented with preheated composite (Enamel plus HRi, Micerium, Italy), Subgroups (DDS+Dcrs, IDS+Dcrs): cemented with dual-cured resin cement (RelyX Ultimate, 3M ESPE, Germany) and Subgroups (DDS+Fc, IDS+Fc): Cemented with flowable composite (Filtek supreme flowable, 3M ESPE, USA). Using a digital microscope with a magnification of 230x, the marginal gap was measured before and after cementation at four different locations from each surface of the tooth, and the mean of measurements was calculated and analyzed statistically using the independent t-test, one-way ANOVA test, Bonferroni correction at a significance level of 0.05. Results: The samples that were immediately sealed with dentin bonding agent showed lower marginal gaps than delayed dentin sealing, both pre-and post-cementation for all subgroups, with a statistically significant difference (p < 0.01). The marginal gap was significantly lower in the IDS+Fc (48.888 ± 5.5 micro m) followed by the IDS+Dcrs group (53.612 ±5.8 micro m) and IDS+Phc (79.19 9±6.9 micro m) respectively, while the largest marginal gaps were observed in the DDS+Phc group (86.505 ± 5.4 micro m). Conclusion: Generally, the teeth with IDS showed better marginal adaptation than teeth without IDS. The marginal gap was smaller with flowable composite and dual-cure resin cement than with preheated composite.
<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt& pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi
... Show MoreIn this work, results from an optical technique (laser speckle technique) for measuring surface roughness was done by using statistical properties of speckle pattern from the point of view of computer image texture analysis. Four calibration relationships were used to cover wide range of measurement with the same laser speckle technique. The first one is based on intensity contrast of the speckle, the second is based on analysis of speckle binary image, the third is on size of speckle pattern spot, and the latest one is based on characterization of the energy feature of the gray level co-occurrence matrices for the speckle pattern. By these calibration relationships surface roughness of an object surface can be evaluated within the
... Show MoreThe research aims to identify the theoretical foundations for measuring and analyzing quality costs and continuous improvement, as well as measuring and analyzing quality costs for the Directorate of Electricity Supply / Middle Euphrates and continuous improvement of the distribution of electrical energy,The problem was represented by the high costs of failure and waste in electrical energy result to the excesses on the network and the missing (lost) energy,Thus, measuring and analyzing quality costs for the distribution of electrical energy and identifying continuous improvement leads to a reduction in missing and an increase in sales, as the research reached many conclusions, the most important of which is the high percentage o
... Show MoreA total of 200 samples (180 fecal materials and 20 organ samples) were collected from (5 different poultry farms, 10 local poultry shops, 5 houses poultry, 5 Eggs stores shops and 5hand slaughters centers) in Ibb city, Yemen, 2014. According to morphological, cultural, as well as biochemical characterization and serological tests, 59(29.5%) isolates were identified as Salmonella spp. and all Salmonella isolates were categorized by serotype, which comprised of, 37(62.71%) Salmonella Typhimurium serovar, 21(35.59%). Salmonella Enteritidis serovar and 1(1.69%) Salmonella Heidlberg serovar. Antibiotic sensitivity test was done for bacterial isolates and the results showed there were clear differences in antibiotic resistant. Antimicrobial
... Show MoreBackground: the oral cavity is consider to be an open ecosystem, with the balance between the microorganism’s entrance and the defenses of the host. The initiation of periodontitis has been associated with restricted kinds of anaerobic bacteria, such as Aggregatibacter actinomycetemcomitans (A.a) and Porphyromonas gingivalis (P.g) in plaque subgingivally. Ozone has a biological effects on bacteria due to oxidation of bio-molecules and its toxins. The aim is to determine and compare the antimicrobial effect of gaseous ozone and ozonized water on the growth of isolated anaerobic bacteria (A.a and P.g) when exposed to different time intervals. Materials and methods:This experiment is done byozone generator OLYMPIC- III(600mg/hr) to gene
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreAbstract
The research aims to determine the nature of the Iraqi market in terms of banking financial stability and the extent impact of the operational efficiency on it, Accordingly, chosen 15 relational banks were chosen as an intentional sample that could represent the Iraqi banking system for the period 2010-2020. The operational efficiency variable was measured according to the data envelope model, and banking financial stability used CAMELS model which includes five indicators (capital adequacy, asset quality, management quality, profitability, and liquidity), so for testing the research hypotheses used the random regression model by adopting the S
... Show More