Background: The marginal adaptation has a key role in the success and longevity of the fixed dental restoration, which is affected by the impression and the fabrication techniques .The objective of this in vitro study was to evaluate and compare the marginal fitness of lithium disilicate crowns using two different digital impression techniques (direct and indirect techniques) and two different fabrication techniques (CAD/CAM and Press techniques). Materials and Methods: Thirty two sound upper first premolar teeth of comparable size extracted for orthodontic reason were selected in this study .Standardized preparation of all teeth samples were carried out with modified dental surveyor to receive all ceramic crown restoration with 1 mm deep chamfer finishing line, 4 mm axial length and 6 degree convergence angle. Half of the teeth were duplicated and poured in type IV dental stone to have sixteen dies and then these dies and the remaining teeth divided in to two groups according to the type of digital impression techniques (n=16) as follow: Group A: Indirect digital impression technique scanned by inEos X5 camera; Group B: Direct digital impression technique scanned by CEREC AC Omnicam camera. Each group was subdivided according to the technique of fabrication into two subgroups (n=8): Press technique using IPS e-max press (A1, B1); CAD/CAM technique using IPS e-max CAD (A2, B2).Marginal gaps were evaluated on the prepared teeth at four defined points on each aspect using digital microscope at a magnification of (280X). One way ANOVA and LSD tests were used to identify and localize the source of difference among the groups. Results: The results showed that indirect digital impression with IPS e-max CAD/CAM group A2 revealed the poorest marginal integrity with (55.93 μm ± 3.300). Group B2 and group A1 were next in line with(44.49 μm ± 6.840 and 37.74 μm± 5.433) respectively, while in the first group of restorations, the result of 29.9 μm ± 5.534 obtained with direct digital impression with pressable ceramic was clearly better. Conclusions: All the tested digital impression techniques showed clinically acceptable accuracy and intraoral scanning with pressable ceramic significantly enhanced the marginal fit
This research examines the phonological adaptation of pure vowels in English loanwords in Iraqi Arabic (IA). Unlike previous small-scale studies, the present study collected 346 loanwords through document review and self-observation, and then analyzed them using quantitative content analysis to identify the patterns of pure vowel adaptation involved in incorporating English loanwords into IA. The content analysis findings showed that most pure vowel adaptations in English loanwords in IA follow systematic patterns and may thus be attributed to specific characteristics of both L1 and L2 phonological systems. Specifically, the findings suggest that the IA output forms typically preserve the features of the input pure vowel to the maxi
... Show MoreWireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener
... Show MoreA total of 60 cotton swabs are collected from patients suffering from burn wound and surgical site infections admitted to Baghdad Teaching Hospital and Burn Specialist Hospital in Baghdad city during 9/2013 to 11/2013. All cotton swabs are cultured initially on blood agar and MacConkey agar and subjected for standard bacteriological procedures for bacteriological diagnosis. Twenty samples out of sixty are identified as Pseudomonas aeruginosa by conventional methods. The results of antibiotic susceptibility test illustrate that the antibiotics resistance rate of Pseudomonas aeruginosa isolates is as follows:100% (2020) for ceftriaxone, cefepime and carbencillin, 70% (14/20) for amikacin, 65%(13/20) for tobramycin, ceftazidim and gentamycin,
... Show MoreTwo Prototypes of Transversely Excited at atmospheric pressure (TEA) Nitrogen laser systems (One Stage Blumlein Circuit and Two Stage Blumlein Circuit) were fabricated and operated. High voltage power supply with variable operating voltage (0-20 kv) and operating current (1-3A) was built and tested successfully. The gas flow rate of 15 L/ min and 10 L/ min for OSBC and TSBC was used. The performance of the fabricated systems was studied extensively reaching to the optimum operating conditions. The obtained laser output energy for the first system has linear relationship with the applied voltage. The maximum output energy was about (1.14 mJ) with (10.40) ns pulse duration and the half-wave divergence angle was about (0.1455 m rad). In the
... Show MoreThe aquatic crude extract of Silybum marianum dry grains prepared by melting them in distil water by the method of soak and shake. The effect of Silybum marianum crude extract studied in vitro on three tumor cell line the Hep-2, AMN-3 and RD for 24, 48 and 72 hours of exposure, and one cell line of normal cells REF for 72 hr exposure. The results showed that the prescence of toxic effect of the aquatic crude extract on the cell lines of Hep-2, AMN-3 and RD at 10 and 100 µg/ ml upto the higher concentrations when they exposed to the extract for 48 hr. as compared with the control treatment, and when the exposure period increased to 72 hr. the toxic effect started at low concentrations (5 and 10 µg/ ml) as compared with the control g
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreClassification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show More