Preferred Language
Articles
/
jbcd-2376
The Influence of Different Fabrication and Impression Techniques on the Marginal Adaptation of Lithium Disilicate Crowns (A comparative in vitro study)
...Show More Authors

Background: The marginal adaptation has a key role in the success and longevity of the fixed dental restoration, which is affected by the impression and the fabrication techniques .The objective of this in vitro study was to evaluate and compare the marginal fitness of lithium disilicate crowns using two different digital impression techniques (direct and indirect techniques) and two different fabrication techniques (CAD/CAM and Press techniques). Materials and Methods: Thirty two sound upper first premolar teeth of comparable size extracted for orthodontic reason were selected in this study .Standardized preparation of all teeth samples were carried out with modified dental surveyor to receive all ceramic crown restoration with 1 mm deep chamfer finishing line, 4 mm axial length and 6 degree convergence angle. Half of the teeth were duplicated and poured in type IV dental stone to have sixteen dies and then these dies and the remaining teeth divided in to two groups according to the type of digital impression techniques (n=16) as follow: Group A: Indirect digital impression technique scanned by inEos X5 camera; Group B: Direct digital impression technique scanned by CEREC AC Omnicam camera. Each group was subdivided according to the technique of fabrication into two subgroups (n=8): Press technique using IPS e-max press (A1, B1); CAD/CAM technique using IPS e-max CAD (A2, B2).Marginal gaps were evaluated on the prepared teeth at four defined points on each aspect using digital microscope at a magnification of (280X). One way ANOVA and LSD tests were used to identify and localize the source of difference among the groups. Results: The results showed that indirect digital impression with IPS e-max CAD/CAM group A2 revealed the poorest marginal integrity with (55.93 μm ± 3.300). Group B2 and group A1 were next in line with(44.49 μm ± 6.840 and 37.74 μm± 5.433) respectively, while in the first group of restorations, the result of 29.9 μm ± 5.534 obtained with direct digital impression with pressable ceramic was clearly better. Conclusions: All the tested digital impression techniques showed clinically acceptable accuracy and intraoral scanning with pressable ceramic significantly enhanced the marginal fit

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Evaluation the Effect of some Plant Extracts in Controlling the Oriental Hornet vespa orientalis Linnaeus, 1771 Near the Apiaries
...Show More Authors
Abstract<p>A significant amount of apiaries is destroyed in most areas of Iraq by attacking of the hornet<italic>Vespa orientalis</italic>Linnaeus, 1771, as well as the deterioration of European honey bees’ Apis mellifera Linnaeus, 1758 productivity recently because the environmental changes and pollutions; this effect was evident in the economy and plant production, because the bees as the most popular species of pollinator of crops globally. There is no effective and environmentally safe method yet; Therefore, this study suggested to use essential oils of Mediterranean cypress<italic>Cupressus sempervirens</italic>L., 1753 (Pinales: Cupressaceae), and testing as a repellant substance. In</p> ... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Health awareness and health culture among a sample of mothers aged (20 – 43 year) lived in urban and rural zones in Baghdad
...Show More Authors

The study aimed to identify the level of health awareness and health education among mothers zones, urban and rural areas as well as to identify the differences between them and to achieve this study was conducted on a sample of (121) or been Akhittarhn randomly, aged (20 - 43 years) and applied them to a questionnaire to measure the health awareness, which formed from a group of paragraphs, and after the collection of data was treated using the statistical software (SAS), where research showed many of the results are:
1/ Reached the age group ranging between (20-30 years), the highest rate for the present, where was (40.51%), while in the countryside matched by age group (31-40 years old) in terms of (54.76%)./ It turns out that the

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2023
Journal Name
Alustath Journal For Human And Social Sciences
The Effectiveness of a Cognitive-Behavioral Treatment Program to Reduce Nervous Fatigue for Mothers of Children with Cerebral Palsy
...Show More Authors

Cognitive-behavioral therapy is one of the most important relatively recent; treatment programs that attempt to modify behavior and control psychological disorders by modifying the individual's thinking style and awareness of himself and his environment, and cognitive reconstruction by replacing negative thoughts with positive ones. The current study aimed to know the effectiveness of a cognitive behavioral treatment program in reducing nervous fatigue among mothers of children with cerebral palsy. The sample on which the nervous fatigue scale was applied consisted of (30) mothers whose son suffers from cerebral palsy, and the results indicated that (24) mothers suffer from nervous fatigue. This sample was divided

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 09 2021
Journal Name
Education And Information Technologies
Evaluating the use of informational technologies by students of healthcare colleges for academic purposes over a five-year period
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref