Preferred Language
Articles
/
jbcd-443
The influence of recent adhesive onlay fabrication techniques on the fracture resistance of endodontically treated premolars (An in vitro study)
...Show More Authors

Background: Endodontically treated teeth have low resistance to fracture against occlusal forces. The strengthening effect of bonded esthetic onlay restoration on weakened tooth has been reported. This study aimed to assess the fracture resistance of endodontically treated premolars restored with composite with and without cuspal coverage by using direct and indirect techniques. Indirect technique done by CAD/CAM system (computer aided design –computer aided manufacturer) and laboratory processing. Material and methods: Forty human extracted maxillary premolars of approximately comparable sizes were divided into four groups: Group (A): Ten endodontically treated teeth directly filled with Filtek Z250xt without cuspal coverage. Group (B): Ten endodontically treated teeth prepared with onlay cavities and restored directly with Filtek Z250 XT. Group(C): Ten endodontically treated teeth prepared with onlay cavities and restored indirectly with Filtek Z250 XT. Group (D): Ten endodontically treated teeth prepared with onlay cavities and restored indirectly with Paradigm MZ100 CAD/CAM blocks. Fracture strength of the samples was measured by using universal testing machine (an axial compression test). Data were analyzed statistically by one way ANOVA test and least significant difference test, Results showed that Group A has the lowest fracture resistance value than all experimental Groups and the difference are highly significant. While Group B has a high significant fracture resistant value than the indirectly restored groups. Group C and Group D showed an approximate fracture resistant result (1.13KN and 1.07KN respectively) and the difference is statistically not significant. Conclusion All CAD/CAM composite onlay, indirect Filtek z250 XT and direct cuspal coverage survived maximum biting force for posterior single tooth, so these types of onlays provide good reinforcement in an extensive MOD cavities in premolars The mode of fracture for Group D was 90% restorable which is higher than group C (80%) restorable and group B (30%) restorable type of fracture.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Psychological Capital: Behavioral Insight for Study of Spirituality at the Workplace
...Show More Authors

Abstract

      This research aims to identify the role of Psychological Capital (PsyCap) in the Spirituality at the Workplace (SAW) for a sample of the teaching staff of the four Colleges of the University of Kufa reached (200) out of (470) teaching, and to achieve the objective of this research and through access to research and studies of foreign adopted researchers standards scales of research variables, since it relied on the model (Luthans, Youssef, et al., 2007) to represent the components of Psychological Capital (self-efficacy, and hope, and optimism, and resilience), and given the attention organizations in the human element because of it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
Study The Impact of Geopolymer Mortar Reinforced by Micro Steel Fibers
...Show More Authors

In this research, geopolymer mortar had to be designed with 50% to 50% slag and fly ash with and without 1% micro steel fiber at curing temperature of 240℃. The molarity of alkaline solution adjusted with 12 molar sodium hydroxid to sodium silicate was 2 to 1, reaspectivly. The heat of curing increased the geopolymerization proceses of geoplymer mortar, which led to increasing strength, giving the best result and early curing age. The heat was applied for two days by four hours each day. It was discovered in the impact test that the value first crack of each mix was somewhat similar, but the failure increased 72%  for the mixture that did not contain fiber. For the energy observation results it was shown that the mixt

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Nov 19 2023
Journal Name
Aip Conference Proceedings
Designing a database for a three dimensional model using geomatics techniques
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of Physics: Conference Series
Measuring Urban Heat Island Indicators from Surface Temperature Using Spatial Techniques
...Show More Authors
Abstract<p>Using remote sensing technology and modeling methodologies to monitor changes in land surface temperature (LST) and urban heat islands (UHI) has become an essential reference for making decisions on sustainable land use. This study estimates LST and UHI in Salah al-din Province to contribute to land management, Urban planning, or climate resilience in the region; as a result of environmental changes in recent years, LANDSAT Satellite Imagery from 2014- 2024 was implemented to estimate the LST and UHI indexes in Salah al-din Province, ArcGIS 10.7 was use to calculate the indices, and The normalized mean vegetation index (NDVI) was calculated as it is closely related to extracting (LST </p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Apr 26 2019
Journal Name
Journal Of Contemporary Medical Sciences
Breast Cancer Decisive Parameters for Iraqi Women via Data Mining Techniques
...Show More Authors

Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Clinical And Experimental Dentistry
Eradication of mature biofilm from the isthmus region using Er, Cr: YSGG Laser as an activator of 2% chlorhexidine gluconate
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Stability and Hopf bifurcation of an epidemiological model with effect of delay the awareness programs and vaccination: analysis and simulation
...Show More Authors

View Publication
Scopus (13)
Crossref (1)
Scopus Clarivate Crossref