Background: The aim of this study was to measure the radiopacity (RO) of modified microhybrid composite resins by adding 2 types of nanofillers (Zinc Oxide and Calcium Carbonate) in two concentrations 3% and 5% and comparing them to unmodified microhybrid composite resins and to nanofilled composite resin. Materials and Methods: Two types of composite resin were used (Microhybrid composite MH Quadrent anterior shine and Nanofilled composite resin Filtek Z350 XT), for each tested group five disk-shaped specimens (1-mm-thick and 15 mm diameter) were fabricated. The material samples were radiographed together with the aluminum step wedge. The density of the specimens was determined with a transmission densitometer and was expressed in term of equivalent thickness of aluminum. Data analyzed by one-way ANOVA. Results: The radiopacity (RO) values of the tested group ranged between (0.9293- 2.6242 Eq. Al thickness) and there were significant differences among them. Nanofilled composite resin Filtek Z350 XT showed the highest value of RO while unmodified Microhybrid composite MH Quadrent anterior shine showed the lowest value of RO. Conclusion: The addition of 3% of both the ZnO and CaCO3 nanofillers fillers to microhybrid composite significantly increased the RO, while the addition of 5% of CaCO3 and ZnO nanofillers to microhybrid composite showed non-significant increase in the RO of the composite.
In this paper, an Integral Backstepping Controller (IBC) is designed and optimized for full control, of rotational and translational dynamics, of an unmanned Quadcopter (QC). Before designing the controller, a mathematical model for the QC is developed in a form appropriate for the IBC design. Due to the underactuated property of the QC, it is possible to control the QC Cartesian positions (X, Y, and Z) and the yaw angle through ordering the desired values for them. As for the pitch and roll angles, they are generated by the position controllers. Backstepping Controller (BC) is a practical nonlinear control scheme based on Lyapunov design approach, which can, therefore, guarantee the convergence of the position tracking
... Show MoreI came back and made my jewelery from the first research or studies known to man, and the oldest era and confirmed the problem of searching for the links of sweets and admiration of the magnificence of the effectiveness of the search for the importance of preserving the heritage of the Iraqi civilization in its original creative aspects. Metal in Iraq, Head Costume, Neck Costume, Party Costume (Hands and Legs). The main results of the research were;
1-Contemporary folk jewelry in Iraq was characterized by design units for use.
Dependence in the feed industry in the form of laboratory mold.
Background: The accuracy of fitness of any dental casting is imperative for the success of any prosthodontic treatment. From the time that dental casting was first introduced, efforts have been made to produce more accurate and better fitted castings with minimal marginal discrepancy. The aim of this in vitro study was to evaluate the effects of three different investing and burnout techniques on the vertical marginal discrepancies ofceramometalcopings invested with two types of phosphate- bonded investments. Materials and methods: Sixty wax patterns were fabricated on a standardized prepared brass die representing an upper central incisor by the aid of a custom-made split mold. Three different investing and burnout techniques were applied
... Show MoreThis study is concerned with making comparison in using different geostatistical methods for porosity distribution of upper shale member - Zubair formation in Luhais oil field which was chosen to study.
Kriging, Gaussian random function simulation and sequential Gaussian simulation geostatistical methods were adopted in this study. After preparing all needed data which are contour map, well heads of 12 wells, well tops and porosity from CPI log. Petrel software 2009 was used for porosity distribution of mentioned formation in methods that are showed above. Comparisons were made among these three methods in order to choose the best one, the comparing cri
The research aims to identify banking stress tests, which is one of the modern and important tools in managing banking risks by applying the equations of that tool to the sample. The banking sector considered one of the most vulnerable to sudden and rapid changes in an unstable economic environment, making it more vulnerable. Therefore, it is necessary to establish a special risk management section to reduce the banking risks of the banking business that negatively affect its performance.
The research concluded that there is a direct relationship between stress tests and risk management, as stress tests are an essential tool in risk management. They also considered a unified approach in managing bank risks that helps the bank to
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More