Background: Endodontically treated teeth have low resistance to fracture against occlusal forces. The strengthening effect of bonded esthetic onlay restoration on weakened tooth has been reported. This study aimed to assess the fracture resistance of endodontically treated premolars restored with composite with and without cuspal coverage by using direct and indirect techniques. Indirect technique done by CAD/CAM system (computer aided design –computer aided manufacturer) and laboratory processing. Material and methods: Forty human extracted maxillary premolars of approximately comparable sizes were divided into four groups: Group (A): Ten endodontically treated teeth directly filled with Filtek Z250xt without cuspal coverage. Group
... Show MoreLithium–Manganese ferrites having the chemical formula (Li0.5-0.5x Mnx Fe2.5-0.5x O4), (0 ≤ x ≤ 1) were prepared by double sintering powder processing. The density of the ferrite increased with Mn content while the porosity was noticed to decrease. The dielectric constant was found to increase at high frequencies more rapidly than the low ones. The dielectric constant found to decrease with Mn content. The decrease in loss factor with frequency agreed with Deby’s type relaxation process. A maximum of dielectric loss factor was observed when the hopping frequency is equal to the external electric field frequency. Manganese substitution reduced the dielectric loss in ferrite. The variation of tanδ with frequency shows a similar na
... Show MoreThe world is keeping pace with evolution in all its fields as a result of scientists' pursuit of continuous scientific and technological development. This evolution included the sports field, which had a large space in the aspect of development and for all disciplines, Therefore, it's reflected today in what we see of records and advanced achievements in sporting events and activities. The development in the field of sports was the result of scientific research (Hussein and Jawad., 2022), where the interest in the training process has become one of the most important pillars of the development of achievement (Neamah and Altay., 2020). The shooting sport has also witnessed a remarkable development due to the diversity and development of its
... Show MoreThis paper presents thermal characteristics analysis of a modified Closed Wet Cooling Tower (CWCT) based on heat and mass transfer principles to improve the performance of this tower in Iraq. A prototype of CWCT optimized by added packing was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of the air measured at intermediate points of the heat exchanger and packing. Heat exchangers consist of four rows and eight columns for an inline tubes arrangement and six rows and five columns f
... Show MoreHigh peak to average power ration (PAPR) in orthogonal frequency division multiplexing (OFDM) is an important problem, which increase the cost and complexity of high power amplifiers. One of the techniques used to reduce the PAPR in OFDM system is the tone reservation method (TR). In our work we propose a modified tone reservation method to decrease the PAPR with low complexity compared with the conventional TR method by process the high and low amplitudes at the same time. An image of size 128×128 is used as a source of data that transmitted using OFDM system. The proposed method decrease the PAPR by 2dB compared with conventional method with keeping the performance unchanged. The performance of the proposed method is tested with
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreDecision-makers in each country work to define a list of internal and external interests, goals and threats to their countries according to the nature of their awareness of these interests, goals and threats.
Hence, Iraq is not an exception to this rule, and the process of evaluating its interests and the objectives of its foreign policy is subject to the pattern of awareness of decision-makers and the influencing forces in defining its basic interests, which often witness some kind of difference in defining them, evaluating their importance and determining the size of the threats they face. And among these interests and threats that have witnessed a difference in the assessment of their
... Show MoreThe present work covers the Face-Hobbing method for generation and simulation of meshing of Face hobbed hypoid gear drive. In this work the generation process of hobbed hypoid gear has been achieved by determination of the generation function of blade cutter. The teeth surfaces have been drawn depending on the simulation of the cutting process and the head cutter motion. Tooth contact analysis (TCA) of such gear drive is presented to evaluate analytically the transmission error function for concave and convex tooth side due to misalignment errors. TCA results show that the gear is very sensitive to misalignment errors and
the increasing of the gear teeth number decrease the transmission error for both concave and convex tooth sides a