ABSTRACT Purpose: the aim of this in vitro study was to compare the marginal gap and internal fitness between single crowns and the crowns within three-unit bridges of zirconium fabricated by CAD-CAM system. Materials and methods: A standard model from ivoclar company was used as a pattern to simulate three-units bridge (upper first molar and upper first premolar) as abutments used to fabricate stone models, eight single crowns for premolar and eight of three units bridges. Crowns and bridges fabricated by CAD-CAM system were cemented on their respective stone models then sectioned at the mid-point buccolingaully and misiodistaly and examined under stereomicroscope. Result: the marginal gap in premolar crowns and premolar within bridge were within the acceptable value 120µm, one –way ANOVA showed that there was significant differences in the internal gaps among the areas. Independent t- Test showed there was significant differences between the premolar crowns and premolar crowns within bridges in marginal opening and cusp tip (lingually and distally) Conclusion: the marginal and internal gaps were in the bridge higher than those in the crowns. The areas of sloped surfaces such as chamfer area, occlusal area and cusp tip had high gap values in comparison with areas of flat surfaces such as axial wall and when the surface area of abutment increased, the marginal and internal gaps of abutment was increase.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe utilization of carbon dioxide (CO₂) to enhance wellbore injectivity presents a cost-effective and sustainable strategy for mitigating greenhouse gas emissions while improving reservoir performance. This study introduces an environmentally friendly method employing a water-soluble chitosan salt (CS) that generates a carbonated-rich acid solution upon contact with dry CO₂ at 25 °C and 508 psi. CS solutions (100–2000 ppm) were prepared and evaluated for CO₂ uptake, acid generation, and rheological behavior. Results show that 1000 ppm achieves an optimal CO2 uptake (2612 mg/l), with moderate viscosity increase (from 1.52 to 3.37 cp), while higher concentrations exhibit a sharp rise due to polymer-like network formation. Core floodi
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreIntroduction: The association between acute stroke and
renal function is well known. The aim of this study is to
know which group of patients with acute stroke is more
likely to have undiagnosed Chronic Kidney Disease and
which risk factors are more likely to be associated with.
Methods:We studied 77 patients who were diagnosed to
have an acute stroke.Patients were selected between
April2011andJune 2011 using the " 4-variable
Modification of
Diet in Renal Disease Formula " which estimates
Glomerular Filtration Rate using four variables :serum
creatinine ,age ,race and gender.
Results :The study included 38 male and 39 females
patients ,aged (35-95) years. Glomerular Filtration Rate in
patients wi
Item Difficulty and Item Discrimination Coefficient for School and College Ability Tests (SCAT) Advanced Form in Classical Test Theory (CTT) and Item Response Theory (IRT) and the Correlation among Them Mohammad moqasqas Haifa T. Albokai Assistant Professor of Measurement and Evaluation Associate Professor of Measurement and Evaluation College of Education, Taibah University The aim of this study was to study the item difficulty and item discrimination of the SCAT (advance form) with CTT, and IRT, and to study the correlation among them. To do this, the researchers used the data of their previous study, which conducted in (2011). It consisted of (3943) subject. Then, they used two-statistical programs (TAP, Bilog-MG-3) to obtain the item
... Show MoreThis study was conducted at the Poultry Research Station, Animal Resources Research Department at the Agricultural Research Department / Ministry of Agriculture - Baghdad Abu Ghraib. To find the effect of adding different proportions of Bay Laurus powder on productive performance and some physiological characteristics of birds during the production stage as Eight Hundreds Female birds of quail were used at the age of 45 days, randomly deployed to 4 treatments with two replicates (100 birds / replicate ) each, and the bay laurel powder was added in the proportions 0.0, 0.5, 1.0, and 1.5% to the diets and for a period of 60 days divided into 4 periods of 15-day .The results indicated si
Achieving goals effectively reflects the success of the institution. However, unless this indicator is coupled with efficiency when achieving goals, the institution will be equal in its achievements, and distinction will remain unachieved. Perhaps the role of the teaching staff in pushing the institution or college towards brilliance focuses on their ability to motivate people on the one hand and their interest in achieving brilliance for the institution. On the other hand, the importance of the research lies in the institution’s reaching a prominent position through the brilliance and creativity of teaching and achieving competition between institutions that make it more brilliance. The study seeks to achieve the goal of the real
... Show MoreCapparis spinosa is one of the oldest genera grown in Iraqi land with worldwide traditional medicinal uses beside the culinary uses. These uses were own to the presence of many phytochemical including flavonoids, polyphenols. Among the reported polyphenolic acids are caffeic, chlorogenic and ferulic acids with well-known powerful antioxidant properties. The present work aimed to identify the presence of these polyphenolic acids in Iraqi caper naturally gown in the rural area of middle Iraq following standard chromatographic procedures. Aerial parts of the plant (buds, berries and leaves) were extracted with hydroalcoholic solvent by maceration method. Thin layer chromatographic techniques and HPLC analysis were performed to iden
... Show More