Background: The objective of this in vitro study was to evaluate the vertical marginal fit of crowns fabricated with ZrO2 CAD/CAM, before and after porcelain firing cycles and after glaze cycles. Materials and Methods: An acrylic resin model of a left maxillary first molar was prepared and duplicated to have Nickel-Chromium master die. Ten die stone dies were sent to the CAD/CAM (Amann Girrbach) for crowns fabrication. Marginal gaps along vertical planes were measured at four indentations at the (mid mesial, mid distal, mid buccal, mid palatal) before (Time 0) and after porcelain firing cycles (Time 1) and after glaze cycles (Time 2) using a light microscope at a magnification of ×100. One way ANOVA LSD tests were performed to determine whether the mean and standard deviation of sub group Time 2. Results: The mean values of the ZrO2 CAD/CAM Time 0 were (6.77?m), Time 1(8.75?m) and Time 2(10.62 ?m). One way ANOVA test revealed highly statistical significance(P<0.01). LSD test results showed that there is highly significant difference between time (0) and time (2), while there is no any significant difference between time (0) and time (1), and between time (1) and time (2). Conclusions: Within the limitations of this study, it was concluded that the ZrO2 CAD/CAM demonstrated acceptable marginal fit; The porcelain firing and the glaze firing cycles affected the marginal gap
The Red Palm Weevil (RPW), Rhynchophorus ferrugineus (Olivier, 1790) is a devastating invasive pest of palm trees, invading the Iraqi date palm tree in 2015 for the first time in Safwan county, Basrah province. The Red Palm weevil has been categorized as a quarantine pest of date palm trees worldwide. In this study, a five years monitoring program has been achieved by scouting the invasive pest RPW population in Safwan county by using visual sampling and Pheromone baited traps.
The results indicated that the number of infested palms, increased from 12 trees in 2015 to 111 in 16 orchards in 2016. The number of the infested palms was minimized to 3 trees in the county in 2019 due to the management protocol of the Ministry of Agriculture
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreImage databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
The problem of research lies in answering some of the question: What is the reality of (vital conscience) in some colleges and departments of physical education and sports science in Baghdad from the viewpoint of the teachers? And The aim of the research is to prepare a scale (the vitality of the conscience) and learn about its reality in colleges and departments of physical education and sports science in Baghdad from the viewpoint of teachers and The researcher relied on the descriptive method in the survey method and the relationships related to the nature of the research problem and The sample of the research was senior administrators teaching some colleges and departments of physical education and sports science in Baghdad , Th
... Show MoreDisasters, crises and wars are a serious and unforeseen threat. The capacity of the early warning system to monitor such crises is therefore crucial. The ability to make quick decisions in a short time is necessary to prevent crises from occurring. Here, the role and effectiveness of the early warning system emerges through its ability to monitor, record and analyze signals. It can also be evidenced by its ability to immediately convey these indicators to the concerned authorities to take measures that ensure these conflicts and disasters do not worsen. The system’s ability to detect disasters and crises, identify the crisis and its type, and use the scientific method and common sense to deal with it is something that contributes to findi
... Show MoreThe emergence of SARS-CoV-2, the virus responsible for the COVID-19 pandemic, has resulted in a global health crisis leading to widespread illness, death, and daily life disruptions. Having a vaccine for COVID-19 is crucial to controlling the spread of the virus which will help to end the pandemic and restore normalcy to society. Messenger RNA (mRNA) molecules vaccine has led the way as the swift vaccine candidate for COVID-19, but it faces key probable restrictions including spontaneous deterioration. To address mRNA degradation issues, Stanford University academics and the Eterna community sponsored a Kaggle competition.This study aims to build a deep learning (DL) model which will predict deterioration rates at each base of the mRNA
... Show MoreVisceral leishmaniosis is one of the most fatal old-world neglected disease with estimated 90 thousand worldwide cases emerge each year. In Iraq, the cutaneous and visceral form are endemic but available chemotherapies are either toxic with diverse side effects, expensive available drugs or parasite …