Background: This study evaluated the influence of different fiber formulations incorporation in resin composite on cuspal deflection (CD) of endodontically-treated teeth with mesio-occluso-distal (MOD) cavities. Materials and Methods: Thirty-two freshly extracted maxillary premolar teeth received MOD cavity preparation followed by endodontic treatment using single cone obturation technique, and divided into: Group I: direct composite resin only using a centripetal technique, Group II: direct composite resin with short fiber-reinforced composite (everX Flow), Group III: direct composite resin with leno wave ultra-high molecular weight polyethylene (LWUHMWPE) fibers placed on the cavity floor, and Group IV: direct composite resin with LWUHMWPE fibers placed circumferentially around the cavity walls (wallpapering technique). The CD was measured using a novel digital evaluation method, whereby each tooth was scanned by a desktop scanner (Medit T710) at three different time intervals: before and after cavity preparation, and after restoration. The intercuspal distance (ICD) was measured digitally in μm at each interval using Medit compare metrology software, followed by measurement of the CD by subtracting the ICD after cavity preparation; and after restoration from the before preparation one to obtain the “after cavity preparation CD1” and “the after restoration CD2”, respectively. The data were analyzed using one-way ANOVA and Tukey HSD tests at a significance level of 0.05. Results: The highest CD was recorded in Group I with statistically significant differences with all other groups (P<0.05). No statistically significant differences were found between the other groups (Groups II, III, and IV) (P>0.05). Conclusions: There was an inward deflection of the cusps in all groups following cavity preparation and restoration as elicited by the negative CD1 and CD2 values. The incorporation of fibers, regardless of their type or orientation, resulted in a significant reduction in CD of endodontically treated premolar teeth as compared with those restored with resin composite alone.
One of the Kurdish scholars who have research on the doctrinal issues of the author of this brief message that we are about to achieve; to bring it out better and in order to preserve the Islamic heritage, and revive what can be revived after being close to death by staying in libraries here and there, out of reach of hands, carrying dust Years of forgetting and marginalization, and this letter is the papers in the door of the divorce entitled his author "Iqdar al-dream for those who did not sign divorce commoner," and the name is evident the name, and the intention of the author through writing, where he wrote it to answer some of the knowledgeable among the public at the time So they decreed that there was no divorce from commoners D w
... Show MoreThe implicit is the narrative technique used to give indirect hidden messages. To read between the lines means to understand the implicit meaning that is not directly indicated. This technique is expressed in two forms: the hypothesis and the implications of linguistic and non-linguistic rules. Nathalie Sarraute’s "Pour un oui ou pour un non" states this narrative method through her character’s verbal and non-verbal dialogue. The present paper discusses the implicit method and shows the reason behind which the author uses it in her play "Pour un oui ou pour un non".
Résumé
... Show MoreThe present work focuses on examining the strategy of cognitive trips and the Arabic language teachers’ training needs of such a strategy when teaching Arabic language courses in the Saudi Arabia Kingdom. To achieve the objective of the study, and check whether this strategy is used in lesson planning, lesson teaching, or lesson assessment, a descriptive approach and a questionnaire have been adopted. The researchers used a number of statistical tools, and chose a purposive sample, which consists of (58) Arabic language teachers from Saudi Arabia Kingdom. Results have shown that the training needs of Arabic language teachers for implemining the strategy of cognitive journeys while teaching Arabic language courses came in the following
... Show MoreIn this work, polynomials and the finite q-exponential operator are constructed. The operator is used to combine an operator proof of the generating function with its extension, Mehler's formula with its extension and Roger's formula for the polynomials . The generating function with its extension, Mehler's formula with its extension and Rogers formula for Al-Salam-Carlitz polynomials are deduced by giving special values to polynomials .
Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show MoreThe revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreOur study comes up to clarify the role of television in spreading the culture of violence with a child. This study represents one of the important studies that have tried to highlight the impact of these programmes, particularly cartoons, on the child's behaviors, actions and acquired habits.Violence considers a common phenomenon among the people, as the role of the media, particularly TV has a vital role due to its properties, characteristics and its significant impact on different segments and groups in society and in children particularly through exposure to programmes of films.The results of the study have been affected by the rising proportion of females to males, and that the contribution of real life has a big role in the child ac
... Show MoreEnvironmental Tax is deemed as one of the most important tools that can be used to eliminate the problem of oil –based environment pollution resulted out of oil products processes and this has been significantly approved by the experience in those leading countries in the field of protecting the environment against pollution whereas oil-producing countries which are rather awkward in maintaining the environment such as Iraq , suffer from notorious environmental effects pertaining to oil product processes.
The problem of the research is represented the increased and constant rise in the volume of the environmental pollutants resulted from the processes managed by the intern
... Show MoreThe paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show More