Objective: Evaluate the effects of different storage periods on flexural strength (FS) and degree of conversion (DC) of Bis-Acryl composite and Urethane dimethacrylate provisional restorative materials. Material and Methods: A total of 60 specimens were prepared from four temporary crown materials commercially available and assigned to four tested groups (n = 15 for each group): Prevision Temp, B&E CROWN, Primma Art, and Charm Temp groups. The specimens were stored in artificial saliva, and the FS was tested after 24 h, 7 d, and 14 d. A standard three-point bending test was conducted using a universal testing machine. Additionally, the DC was determined using a Fourier transform infrared spectroscopy (FTIR) device. The data were analyzed statistically using two- way ANOVA, Tukey`s HSD post-hoc test, and the Bonferroni test, all at a 5% significance level. For each group, a paired samples test was applied to compare the DC of the immediate and 24 h samples. Results: The highest FS value was found for the Prevision Temp material, while the Charm Temp material showed the lowest FS, with no statistically significant difference between the mean values of the groups at 24 h; while there were significant differences at 7d and 14 d of storage. However, within each group, the aging had no significant impact on the FS, except for an increase in the FS of the B&E CROWN group after 14 d. Prevision Temp also had the highest mean DC value. At each time interval, significant differences were recorded. Moreover, within each group of material, aging significantly increased the DC, except for the Primma Art. Conclusion: Bis-acryl composite resin materials exhibited higher flexural strength compared to traditional methyl methacrylate resin during the 14 d investigation period. Aging in artificial saliva did not significantly affect the mechanical performance of the tested materials. Materials with higher DC values showed greater flexural strength; where the Prevision Temp showed higher FS and DC values than the other tested materials.
The current research is interested in the objective study of revitalizing the religious sites and the extent to which they achieve the pragmatic and semantic ends, because they are derived from history and civilization and have a clear impact over the recipient. The research question is (what are the techniques of developing the spaces of the religious shrines in accordance with revitalizing the interior spaces within them?).
The research aims at determining the weak and strong points in the process of revitalizing the interior spaces in the religious shrines.
The theoretical framework consists of two parts: the first addressed the revitalization in the interior design, and the second addressed the religious shrines and th
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreSand production in unconsolidated reservoirs has become a cause of concern for production engineers. Issues with sand production include increased wellbore instability and surface subsidence, plugging of production liners, and potential damage to surface facilities. A field case in southeast Iraq was conducted to predict the critical drawdown pressures (CDDP) at which the well can produce without sanding. A stress and sanding onset models were developed for Zubair reservoir. The results show that sanding risk occurs when rock strength is less than 7,250 psi, and the ratio of shear modulus to the bulk compressibility is less than 0.8 1012 psi2. As the rock strength is increased, the sand free drawdown and depletion becomes larger. The CDDP
... Show MoreThe aim of this paper is to shed the light on the concepts of agency theory by measuring one of the problems that arise from it, which is represented by earnings management (EM) practices. The research problem is demonstrated by the failure of some Iraqi banks and their subsequent placement under the supervision of the Central Bank of Iraq, which was attributed, in part, to the inadequacy of the agency model in protecting stakeholders in shareholding institutions, as well as EM, pushed professional institutions to adopt the corporate governance model as a method to regulate the problem of accounting information asymmetry between the parties to the agency. We are using the Beneish M-score model and the financial analysis equations in
... Show MoreIn this paper, we investigate the automatic recognition of emotion in text. We perform experiments with a new method of classification based on the PPM character-based text compression scheme. These experiments involve both coarse-grained classification (whether a text is emotional or not) and also fine-grained classification such as recognising Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method significantly outperforms the traditional word-based text classification methods. The results show that the PPM compression based classification method is able to distinguish between emotional and nonemotional text with high accuracy, between texts invo
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More