Background: The marginal adaptation has a key role in the success and longevity of the fixed dental restoration, which is affected by the impression and the fabrication techniques .The objective of this in vitro study was to evaluate and compare the marginal fitness of lithium disilicate crowns using two different digital impression techniques (direct and indirect techniques) and two different fabrication techniques (CAD/CAM and Press techniques). Materials and Methods: Thirty two sound upper first premolar teeth of comparable size extracted for orthodontic reason were selected in this study .Standardized preparation of all teeth samples were carried out with modified dental surveyor to receive all ceramic crown restoration with 1 mm deep chamfer finishing line, 4 mm axial length and 6 degree convergence angle. Half of the teeth were duplicated and poured in type IV dental stone to have sixteen dies and then these dies and the remaining teeth divided in to two groups according to the type of digital impression techniques (n=16) as follow: Group A: Indirect digital impression technique scanned by inEos X5 camera; Group B: Direct digital impression technique scanned by CEREC AC Omnicam camera. Each group was subdivided according to the technique of fabrication into two subgroups (n=8): Press technique using IPS e-max press (A1, B1); CAD/CAM technique using IPS e-max CAD (A2, B2).Marginal gaps were evaluated on the prepared teeth at four defined points on each aspect using digital microscope at a magnification of (280X). One way ANOVA and LSD tests were used to identify and localize the source of difference among the groups. Results: The results showed that indirect digital impression with IPS e-max CAD/CAM group A2 revealed the poorest marginal integrity with (55.93 μm ± 3.300). Group B2 and group A1 were next in line with(44.49 μm ± 6.840 and 37.74 μm± 5.433) respectively, while in the first group of restorations, the result of 29.9 μm ± 5.534 obtained with direct digital impression with pressable ceramic was clearly better. Conclusions: All the tested digital impression techniques showed clinically acceptable accuracy and intraoral scanning with pressable ceramic significantly enhanced the marginal fit
This study evaluated the influence of administering different levels of L-arginine into eggs of 0-day-old Japanese quail embryos. On day 0 of incubation, 480 eggs (120 for each treatment group) were injected with 0% arginine (C group), 1% arginine (T1), 2% arginine (T2) or 3% arginine (T3). After hatching, 336 quail chicks (84 chicks produced from each in ovo injection treatment) were placed in an experimental quail house and allocated to four treatment groups of three replicates, with 16 quail chicks for each replicate. Traits involved in this study were hatchability rate, initial body weight (7 days of age), final body weight (42 days old), feed intake, weight gain, feed conversion ratio and blood serum glucose, protein, cholesterol, tota
... Show MoreThe
The research aims to shed light on the ethics of information systems and their role in achieving banking excellence for a sample of private banks in the province of Baghdad. It is important to focus on studying the ethics of banking information systems, which has become one of the most important basic and strategic resources that banks rely on to achieve outstanding performance. Achieving banking leadership in the Iraqi banking market. The researchers adopted the descriptive analytical approach to the research, and the questionnaire was considered as a main tool for collecting information in addition to personal interviews. The research reached the most important results that there is an acceptable correlation relationship between the ethic
... Show MoreUnconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria. Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core. Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um
... Show MoreThe current research aims to focus on strategic vigilance dimensions and contained (environmental vigilance, technological vigilance, competitive vigilance, vigilance marketing) to improve nursing services, which include a) the quality, timeliness, problem-solving and decision-making, relationships with others, leadership skills) and measure the degree link and influence between strategic vigilance in the hospital respondent and improve nursing service that the problem of the research lies in the weakness of strategic plans and health organizations in general and the hospital surveyed (martyr Ghazi al-Hariri), in particular, the lack of awareness of the hospital researched strategy vigilant management to improve nursing services,
... Show MoreIn this study, the stable isotop 18O and 2H has been used to investigate the interaction of surface water (SW), and groundwater (GW) in Al-Taji district/ Northern Baghdad for two seasons (March and August 2022). 16 Samples were collected from water resources in the Al-Taji district (Tigris channel, Tigris River, and groundwater), in each season water samples from 8 Tigris channel, 5 drilled wells, and 3 Tigris River were taken for the analysis of the isotopes 18O and 2H. The average analysis results of 18O and 2H in the Tigris channel, Tigris River, and groundwater were found to be -3.435‰ and -18.6094‰, -2.07167‰ and -17.81‰, -4.125‰ and -34.707‰ respectively. The results, generally, show a comparable range of isotope c
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More