Preferred Language
Articles
/
jbcd-583
Fracture strength of laminate veneers using different restorative materials and techniques (A comparative in vitro stuy)
...Show More Authors

Background: Esthetic correction represents one of the clinical conditions that required the use of laminate veneers in premolars region. Aim of the study: The purpose of this study was to evaluate the fracture strength of the laminate veneers in maxillary first premolars, fabricated from either composite (direct and indirect techniques) or ceramic CAD/CAM blocks. Materials and Methods: Fifty sound human maxillary premolar teeth were used in this in vitro study. Teeth were divided randomly into one control group and four experimental groups of ten teeth each; Group A: Restored with direct composite veneer (Filtek Z250 XT), Group B: Restored with indirect composite veneers (Filtek Z250 XT), Group C: Restored with lithium disilicate ceramic CAD/CAM blocks (IPS e. max CAD) and Group D: Restored with resin nano ceramic CAD/CAM blocks (Lava Ultimate Restorative). Standard preparations were done using Ceramic Veneer Set (Komet). Indirect laminate veneers were cemented with the Relyx Veneer Cement (3M ESPE) and all specimens were stored in distilled water at 37°C for 2 weeks. The load was applied on the occlusal part of the veneer at 45˚ to long axis of the tooth using universal testing machine. Results were analyzed with one-way ANOVA and LSD tests. Specimens were examined by stereomicroscope at a magnification of 20x to evaluate the mode of failure. Results: Control group showed higher mean of fracture strength with highly significant difference in comparison to the experimental groups (P<0.01). (Group A) showed higher mean of fracture strength with statistically significant difference in comparison to (Group B and Group D). On the other hand the difference between (Group A and Group C) was statistically highly significant. Statistically non-significant difference was found among the three indirectly restored groups. Conclusions: All veneers used in this study can be considered as acceptable treatment in the premolars region for patients with normal biting force. Direct composite veneer is the most favorable technique in term of fracture strength, while IPS e. max CAD laminate veneers were least likely to fracture and most likely to completely debond.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Space Charge Effect for Design Electron Gun Using Five Electrode Immersion Electrostatic Lenses
...Show More Authors

 Computer theoretical study has been carried out on the design of five electrode immersion electrostatic lens used in electron gun application. The finite element method (FEM) is used in the solution of the Poisson's equation fro determine axial potential distribution, the electron trajectory under Zero magnification condition .      The optical  properties : focal length ,spherical and chromatic aberrations are calculated,From studying the properties of the designed electron gun. we have good futures for these  electron gun where are abeam current 4*10-4A    can be supplied by using cathode tip of radius 100 nm.

View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Solving Fractional Damped Burgers' Equation Approximately by Using The Sumudu Transform (ST) Method
...Show More Authors

       In this work, the fractional damped Burger's equation (FDBE) formula    = 0,

View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Ultrasound Images Registration Based on Optimal Feature Descriptor Using Speeded Up Robust Feature
...Show More Authors

Image registration plays a significant role in the medical image processing field. This paper proposes a development on the accuracy and performance of the Speeded-Up Robust Surf (SURF) algorithm to create Extended Field of View (EFoV) Ultrasound (US) images through applying different matching measures. These measures include Euclidean distance, cityblock distance, variation, and correlation in the matching stage that was built in the SURF algorithm. The US image registration (fusion) was implemented depending on the control points obtained from the used matching measures. The matched points with higher frequency algorithm were proposed in this work to perform and enhance the EFoV for the US images, since the maximum accurate matching po

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 14 2023
Journal Name
Iraqi Journal Of Science
Optimum conditions for Invertase production from Saccharomyces cere-visiae using solid state fermentation
...Show More Authors

Three Saccharomyces cerevisiae isolates from different sources (China, Turkey and Egypt) were screened by culturing on solid state fermentation to select the most efficient isolate for invertase production. S. cerevisiae from China was high specific activity 34.7 U/mg. The optimum conditions for enzyme production from this isolate were determined by using a medium composed of wheat bran moisten with 1:0.5 (v:w) corn steep liquor as nitrogen source at initial pH 5.0 for 5 days at 30OC.

View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Robust Blind Watermarking Technique Against Geometric Attacks for Fingerprint Image Using DTCWT-DCT
...Show More Authors

In this research paper, a new blind and robust fingerprint image watermarking scheme based on a combination of dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains is demonstrated. The major concern is to afford a solution in reducing the consequence of geometric attacks. It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. The initial sub-vectors were obtained by sub-sampling in the host fingerprint image of both real and imaginary parts of the DTCWT wavelet coeffi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Big-data Management using Map Reduce on Cloud: Case study, EEG Images' Data
...Show More Authors

Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Exploring the Factors Affecting the Elemental Cost Estimation with Relationship Analysis Using AHP
...Show More Authors

Cost estimation is considered one of the important tasks in the construction projects management. The precise estimation of the construction cost affect on the success and quality of a construction project. Elemental estimation is considered a very important stage to the project team because it represents one of the key project elements. It helps in formulating the basis to strategies and execution plans for construction and engineering.  Elemental estimation, which in the early stage, estimates the construction costs depending on  . minimum details of the project so that it gives an indication for the initial design stage of a project. This paper studies the factors that affect the elemental cost estimation as well as the rela

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reinforcement Steel Corrosion Reduction by Using Fly Ash from South Baghdad Power Plant
...Show More Authors

Corrosion- induced damage in reinforced concrete structure such as bridges, parking garages, and buildings, and the related cost for maintaining them in a serviceable condition, is a source of major concern for the owners of these structures.
Fly ash produced from south Baghdad power plant with different concentrations (20, 25 and 30) % by weight from the cement ratio were used as a corrosion inhibitor as a weight ratio from the cement content.
The concrete batch ratio under study was (1:1.5:3) cement, sand and gravel respectively which is used in Iraq. All the raw materials used were locally manufactured.
Concrete slabs (250x250x70) mm dimensions were casted, using Poly-wood molds. Two steel bars were embedded in the central po

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Using Multi-Objective Bat Algorithm for Solving Multi-Objective Non-linear Programming Problem
...Show More Authors

Human beings are greatly inspired by nature. Nature has the ability to solve very complex problems in its own distinctive way. The problems around us are becoming more and more complex in the real time and at the same instance our mother nature is guiding us to solve these natural problems. Nature gives some of the logical and effective ways to find solutions to these problems. Nature acts as an optimized source for solving the complex problems.  Decomposition is a basic strategy in traditional multi-objective optimization. However, it has not yet been widely used in multi-objective evolutionary optimization.   

Although computational strategies for taking care of Multi-objective Optimization Problems (MOPs) h

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (7)
Scopus Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF