Background: Endodontically treated teeth have low resistance to fracture against occlusal forces. The strengthening effect of bonded esthetic onlay restoration on weakened tooth has been reported. This study aimed to assess the fracture resistance of endodontically treated premolars restored with composite with and without cuspal coverage by using direct and indirect techniques. Indirect technique done by CAD/CAM system (computer aided design –computer aided manufacturer) and laboratory processing. Material and methods: Forty human extracted maxillary premolars of approximately comparable sizes were divided into four groups: Group (A): Ten endodontically treated teeth directly filled with Filtek Z250xt without cuspal coverage. Group (B): Ten endodontically treated teeth prepared with onlay cavities and restored directly with Filtek Z250 XT. Group(C): Ten endodontically treated teeth prepared with onlay cavities and restored indirectly with Filtek Z250 XT. Group (D): Ten endodontically treated teeth prepared with onlay cavities and restored indirectly with Paradigm MZ100 CAD/CAM blocks. Fracture strength of the samples was measured by using universal testing machine (an axial compression test). Data were analyzed statistically by one way ANOVA test and least significant difference test, Results showed that Group A has the lowest fracture resistance value than all experimental Groups and the difference are highly significant. While Group B has a high significant fracture resistant value than the indirectly restored groups. Group C and Group D showed an approximate fracture resistant result (1.13KN and 1.07KN respectively) and the difference is statistically not significant. Conclusion All CAD/CAM composite onlay, indirect Filtek z250 XT and direct cuspal coverage survived maximum biting force for posterior single tooth, so these types of onlays provide good reinforcement in an extensive MOD cavities in premolars The mode of fracture for Group D was 90% restorable which is higher than group C (80%) restorable and group B (30%) restorable type of fracture.
Abstract
This research aims to identify the role of Psychological Capital (PsyCap) in the Spirituality at the Workplace (SAW) for a sample of the teaching staff of the four Colleges of the University of Kufa reached (200) out of (470) teaching, and to achieve the objective of this research and through access to research and studies of foreign adopted researchers standards scales of research variables, since it relied on the model (Luthans, Youssef, et al., 2007) to represent the components of Psychological Capital (self-efficacy, and hope, and optimism, and resilience), and given the attention organizations in the human element because of it
... Show MoreIn this research, geopolymer mortar had to be designed with 50% to 50% slag and fly ash with and without 1% micro steel fiber at curing temperature of 240℃. The molarity of alkaline solution adjusted with 12 molar sodium hydroxid to sodium silicate was 2 to 1, reaspectivly. The heat of curing increased the geopolymerization proceses of geoplymer mortar, which led to increasing strength, giving the best result and early curing age. The heat was applied for two days by four hours each day. It was discovered in the impact test that the value first crack of each mix was somewhat similar, but the failure increased 72% for the mixture that did not contain fiber. For the energy observation results it was shown that the mixt
... Show MoreUsing remote sensing technology and modeling methodologies to monitor changes in land surface temperature (LST) and urban heat islands (UHI) has become an essential reference for making decisions on sustainable land use. This study estimates LST and UHI in Salah al-din Province to contribute to land management, Urban planning, or climate resilience in the region; as a result of environmental changes in recent years, LANDSAT Satellite Imagery from 2014- 2024 was implemented to estimate the LST and UHI indexes in Salah al-din Province, ArcGIS 10.7 was use to calculate the indices, and The normalized mean vegetation index (NDVI) was calculated as it is closely related to extracting (LST
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show More