Preferred Language
Articles
/
jbcd-943
The Influence of Different Fabrication Techniques and Preparation Designs on the Marginal Adaptation of Ceramic Veneers (An In vitro Comparative Study)
...Show More Authors

Background: Ceramic veneers represent the treatment of choice in minimally invasive esthetic dentistry; one of the critical factors in their long term success is marginal adaptation. The aim of the present study is to evaluate the marginal gap of ceramic veneers by using two different fabrication techniques and two different designs of preparation. Material and methods: A typodont maxillary central incisor used in the preparation from which metal dies were fabricated, which were in turn used to make forty stone dies. The dies divided into four experimental groups, each group had ten samples: A1: prepared with butt-joint incisal reduction and restored with IPS e.max CAD, A2: prepared with overlapped incisal reduction and restored with IPS e.max CAD. B1: prepared with butt-joint incisal reduction restored with IPS e.max press. B2: prepared with overlapped incisal reduction and restored with IPS e.max press. The marginal gap was measured with direct view technique using digital microscope at a magnification of 230x. Measurements were recorded for four surfaces for each sample and the maximum value was taken to represent that sample. Results: The data were analyzed with two-way ANOVA and independent samples t-tests. These tests revealed highly significant effects of both the preparation design and the technique of fabrication on the marginal gap (p=0.00), with CAD/CAM veneers, group A1 recorded the least marginal gap and pressing group, B2 showed the highest gap values. There was no significant effect of the interaction between the two parameters on the marginal gap. Conclusion: the CAD/CAM veneers with butt joint incisal reduction produced the most accurate margins while the least favorable combination was the pressable ceramic veneers with overlapped incisal reduction.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 08 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
THE ROLE OF TAX IDENTIFICATION NUMBER IN TAX FRAUD PREVENTION : APPLIED RESEARCH AT THE GENERAL TAX AUTHORITY IN IRAQ
...Show More Authors

This thesis aims to show the effects of the development of the traditional manual system of the tax accounting process to the electronic system by the activation of the tax identification numbers (TINs) mechanism. The impact of this development is facilitating the tax accounting process, tax fraudand thus increasing the tax outcome.To prove the research hypothesis, an electronic system was designed based on income tax report, estimation note of individuals, in additional to using Adobe Dreamweaver application to write PHP, HTML, Javascript, and CSS web languages to implement  the proposed system. The research reached a set of conclusions, the most important of which is; not enough the communication methods between the Genera

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Throughput Accounting in Maximizing Profits: Application Search in the General Company for Textile Industry / Cotton Factory
...Show More Authors

        Throughput accounting is concerned with a throughput measurement process to determine the efficiency of the company, to know the problems and obstacles it suffers from, to determine their causes and ways to address them.The research problem is represented by the following question: does the application of a throughput accounting lead to maximizing the company's profits? The aim of the research is to demonstrate the importance of throughput accounting, which is one of the tools of management accounting in providing an efficient information system that provides the company’s management with the information it needs to improve its production processes, increase a throughput, and thus maxi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
*Email:[email protected] 2131 The Accuracy of Prediction for the Models IRI- 2012 and VOACAP in Measurements foF2 Over Iraq during High Solar Activity Level
...Show More Authors

The accuracy of IRI- 2012 and VOACAP models during high solar activity level have been tested to know which of them is more accurate in predicting hourly foF2 values for three Iraqi cities (Baghdad, Mosul and Basrah). The results indicated that the accuracy of them increases for all hours during Spring and Summer and decreases during Winter and Autumn especially at hours near to sunrise; i.e., both of two models have the same accuracy. And that the foF2 values predicted by VOACAP model are higher than that predicted by IRI- 2012 model for all seasons.

View Publication Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The features of the linguistic and cultural component in teaching Russian language to Arab students: Особенности лингвокультурологической составляющей в преподавании русского языка арабским учащимся
...Show More Authors

The author addresses the issue of the linguoculturological component in the process of teaching Russian to Arabic students, focuses on the peculiarities of the national character of students. The author also refers to the long-standing ties of Russian and Arab cultures, thus emphasizing the relevance of this aspect for the current state and situation of the Russian language in Arab countries.

Автор статьи обращается к вопросу лингвокультурологической составляющей в процессе преподавания русского языка арабским студентам, останавливается на особенностях национального хара

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Social support and its relation with death anxiety for olds who are listed at the Palestinian ministry of social affairs in the Jerusalem governorate
...Show More Authors

The study aimed to identify the social support and its relation with death anxiety for
olds who are listed at the Palestinian ministry of social affairs in the Jerusalem governorate,
the researcher uses the descriptive method and she bases her research on two types of
criterion: the social support and the criterion of death anxiety, these two criterion are applied
on a stratified random sample, amounted to (184) of the elderly.
The results show no statistical differences in the level of social support for olds who
are listed at the Palestinian ministry of social affairs according to the variables of sex.
Whereas there are statistical differences in the level of social support for those olds according
to the variab

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
The Invariant Moments Based With Wavelet Used To Decide the Authintication and Originality of Images
...Show More Authors

Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Invariant Moments Based With Wavelet Used To Decide the Authintication and Originality of Images
...Show More Authors

 The digital image with  the wavelet tools  is increasing nowadays with MATLAB library, by using  this method based on invariant moments which are  a set of seven moments can be derived from the second and third moments , which can be calculated after converting the image from colored map to gray scale , rescale the image to (512 * 512 ) pixel , dividing the image in to four equal pieces (256 * 256 ) for each piece , then for gray scale image  ( 512 * 512 ) and the four pieces (256 * 256  ) calculate  wavelet with moment and invariant moment, then  store  the result with the author ,owner for this image to build data base for the original image to decide the authority of these images by u

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 29 2016
Journal Name
Al- Mustansiriyah J. Sci.
The Approximate Solution of Newell Whitehead Segel and Fisher Equations Using The Adomian Decomposition Method
...Show More Authors

In the present work, we use the Adomian Decomposition method to find the approximate solution for some cases of the Newell whitehead segel nonlinear differential equation which was solved previously with exact solution by the Homotopy perturbation and the Iteration methods, then we compared the results.

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Calculating the Vertical Displacement using the Method of Least Squares Adjustment and 3D Objects Fitting
...Show More Authors
Abstract<p>In this research, the Iraqi flagpole at Baghdad University, which is the longest in Baghdad, with a height of 75m, was monitored. According to the importance of this structure, the calculation of the displacement (vertical deviation) in the structure was monitored using the Total Station device, where several observations were taken at different times for two years the monitoring started from November 2016 until May 2017, at a rate of four observations for one year. The observation was processed using the least square method, and the fitting of circles, and then the data was processed. The deviation was calculated using the Matlab program to calculate the values of corrections, where </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac

... Show More
View Publication Preview PDF
Crossref