Objectives To tailor composites of polyethylene–hydroxyapatite to function as a new intracanal post for the restoration of endodontically treated teeth (ETT). Methods Silanated hydroxyapatite (HA) and zirconium dioxide (ZrO2) filled low-density polyethylene (LDPE) composites were fabricated by a melt extrusion process and characterised using infrared spectroscopy (FTIR), differential scanning calorimetry (DSC) and dynamic mechanical analysis (DMA). The flexural strength and modulus were determined in dry state and post ageing in simulated body fluid and fractured surfaces analysed by SEM. The water uptake and radiographic appearance of the experimental composites were also measured and compared with a commercially known endodontic fibre post. Data were submitted to one-way analysis of variance (ANOVA) and post hoc Tukey multiple comparison tests at a level of significance P < 0.05. Results The LDPE/HA composites were structurally flexible and the HA content had a significant effect on the flexural strength and modulus. A univariate analysis of variance showed no significant differences in modulus and strength (P < 0.05) post accelerated ageing in simulated body fluid with very low water uptake. The melting point of the LDPE/HA composites ranged between 135 and 136 °C, which would facilitate removal in case of retreatment using conventional dental heating devices. The inclusion of HA reduced the damping thereby enhancing dimensional stability, whilst the addition of zirconia yielded a semi-translucent material that was sufficiently radiopaque, comparable to commercial posts, thus yielding aesthetic materials. Conclusions Innovative materials for restoration of ETT were developed; offering considerable benefits over the currently available material in terms of biomechanical and thermal properties. Clinical significance This study provided a new option for the development of a new intracanal post made up of functional and aesthetic composites.
Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreABSTRACT: BACKGROUND: The main goal of facelift surgery is to reduce the effect of aging by reposition of face soft tissue in to more youthful orientation. There are many methods for SMAS plication which had different design and vector of pull. AIM OF STUDY: To evaluate the effectiveness and longitivity of 7 shaped SMAS plication in facelift. PATIENT AND METHODS: From January 2020 to march 2021, 10 female patients with age (45-60) years were presented with facial sagging, those patients were subjected to subcutaneous facelift with 7 shaped SMAS plication with fat greft in Al-Shaheed Ghazi Al-Harri Hospital and Baghdad burn medical center at Baghdad medical complex. RESULTS: The average follow up period was 6 to 12 months. The mean operative
... Show MoreKurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters:
Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapte
... Show MoreThis research introduces a developed analytical method to determine the nominal and maximum tensile stress and investigate the stress concentration factor. The required tooth fillets parametric equations and gears dimensions have been reformulated to take into account the asymmetric fillets radiuses, asymmetric pressure angle, and profile shifting non-standard modifications. An analytical technique has been developed for the determination of tooth weakest section location for standard, asymmetric fillet radiuses, asymmetric pressure angle and profile shifted involute helical and spur gears. Moreover, an analytical equation to evaluate gear tooth-loading angle at any radial distance on the involute profile of spur and hel
... Show MoreRecently, the development of the field of biomedical engineering has led to a renewed interest in detection of several events. In this paper a new approach used to detect specific parameter and relations between three biomedical signals that used in clinical diagnosis. These include the phonocardiography (PCG), electrocardiography (ECG) and photoplethysmography (PPG) or sometimes it called the carotid pulse related to the position of electrode.
Comparisons between three cases (two normal cases and one abnormal case) are used to indicate the delay that may occurred due to the deficiency of the cardiac muscle or valve in an abnormal case.
The results shown that S1 and S2, first and second sound of the
... Show MoreThe aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show MoreTI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show More