Background: Maxillary first premolar with wide MOD cavity more susceptible to fracture. The aim of this study was to assess the influence of cavity design for cusp coverage on the fracture resistance of weakened maxillary first premolar restored with CAD/CAM hybrid ceramic versus nanohybide composite. Materials and Methods: Fifty six intact maxillary first premolars of approximately comparable sizes were divided into seven groups eight for each: Group A: Intact teeth (control group); Group B: teeth prepared for MOD inlay; Group C: teeth prepared for MOD onlay covering the lingual cusp; Group D: teeth prepared for MOD covering buccal and lingual cusps ,the previous three groups indirectly restored with nanohybrid composite (3M ESPE Z 250 XT); Group E,F,G prepared with the same design as group B, C, D respectively and restored with CAD/CAM hybrid ceramic (VITA ENAMIC). Results: An axial compression test was used to measure the fracture strength of experimented teeth. The readings were analyzed statistically by t-test, one way ANOVA and LSD, then the mode of fracture had been examined. The results showed that sound teeth in group (A) had more fracture resistance values than all experimental groups and the difference were highly significant with group (B, E, F, G).When the influence of cavity design tested among composite groups it showed highly significant difference between group (B) and (C)and the highest fracture resistance value was for group(C), whereas the influence of cavity design among Enamic groups showed highly significant difference between group (E) and (G) the highest fracture resistance value was for group(E).T-test between similar designs showed non-significant difference between MOD groups and highly difference between other groups. Conclusions: Cusp coverage increased the fracture resistance of composite groups but result in non-restorable fracture, while Enamic total onlay presented promising fracture resistance with favorable mode of fracture. Key words: Fracture resistance, CAD/CAM, hybrid ceramic, VITA ENAMIC, nanohybrid composite, cusp coverage.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThe research aims to find approximate solutions for two dimensions Fredholm linear integral equation. Using the two-variables of the Bernstein polynomials we find a solution to the approximate linear integral equation of the type two dimensions. Two examples have been discussed in detail.
The study aimed to identify the perceptions of social studies teachers in the Governorate of Muscat about the importance of employing the skills of the twenty-first century in teaching. The study employed a qualitative approach. The two researchers used an analytical approach based on the Grounded Theory, the data was gathered through semi-structured interviews with (15) male and female teachers. The results indicated that social studies teachers relate the twenty-first-century skills more to improving students’ achievement level in the subject, while they see that these skills have less influence in developing students’ communication skills and cooperation with their peers. In light of the results of the study, the two researchers r
... Show MoreTrials were carried out in the middle of Iraq ( 3 different sites ) during 2009 to detecation and determined the seasonal occurrence of Agriotes lineatus L. Three YATOR funnel traps were used in each of these sites which baited with the specific pheromone of A. lineatus from the first of March to the end of October in the College of Agriculture - Abu- Ghraib / Provenance of Baghdad and AL-Nile / Provenance of Babylon , while in AL-Radhwania was used through May- June. Pheromone dispenser were changed every 6 weeks in each of these traps . Males of A. lineatus were found in all of the three sites , and the total number capture were 208 , 897 and 57 male / 3 traps / season in College of Agriculture , AL-Nile and AL-Radhwania respectiv
... Show MoreGod Almighty put in his great book secrets that do not end, and wonders that do not expire, for he is the one from which the scholars are not satisfied, and he does not create due to the multitude of response, and it is the comprehensive and inhibitory book that God conceals to the worlds, and he challenged the two heavyweights to come up with something like it.
At all times, issues arise in the Noble Qur’an that fit the needs of the people of that time and their culture, for it is an eternal book, characterized by the ability to give, extend and respond to addressing the problems of the age and its variables, when the Arabs had little luck at the time of the message’s descent from the scientific culture, and their proficienc
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreThe sensitivity of SnO2 nanoparticles/reduced graphene oxide hybrid to NO2 gas is discussed in the present work using density functional theory (DFT). The SnO2 nanoparticles shapes are taken as pyramids, as proved by experiments. The reduced graphene oxide (rGO) edges have oxygen or oxygen-containing functional groups. However, the upper and lower surfaces of rGO are clean, as expected from the oxide reduction procedure. Results show that SnO2 particles are connected at the edges of rGO, making a p-n heterojunction with a reduced agglomeration of SnO2 particles and high gas sensitivity. The DFT results are in