Background: This in vitro study measure and compare the effect of light curing tip distance on the depth of cure by measuring vickers microhardness value on two recently launched bulk fill resin based composites Tetric EvoCeram Bulk Fill and Surefil SDR Flow with 4 mm thickness in comparison to Filtek Z250 Universal Restorative with 2 mm thickness. In addition, measure and compare the bottom to top microhardness ratio with different light curing tip distances. Materials and Method: One hundred fifty composite specimens were obtained from two cylindrical plastic molds the first one for bulk fill composites (Tetric EvoCeram Bulk Fill and Surefil SDR Flow) with 4 mm diameter and 4 mm depth, the second one for Filtek Z250 Universal Restorative with 4 mm diameter and 2 mm depth. Each spcimen was light-cured using WOODPECKER LED CURING LIGHT for 20 sec. Polymerization was performed with the light tip positioned in direct contact, 2 mm, 4 mm, 6 mm and 8 mm distant from the top surface of the sample. After one day of storage in distilled water in a light proof container at 37ËšC, the hardness on the bottom and top surfaces of each specimen was tested using the Digital Micro Vickers Hardness Tester. Then the Data were analyzed statistically by ANOVA test, LSD test and t-test. Results: All experimental groups show top microhardness higher than bottom microhardness with high significant difference with all light tip distances. At 0 mm light tip distance all groups give the highest microhardness value. Filtek Z250 Universal Restorative shows accepted bottom to top microhardness ratio at all light tip distances. Surefil SDR Flow shows accepted bottom to top ratio only at 0, 2 and 4mm light tip distances while Tetric EvoCeram Bulk Fill shows the bottom to top microhardness ratio less than the accepted value with all light tip distances. Conclusion: From the results of this study we can conclude that the polymerization of bulk fill composite depends greatly on the distance from light curing tip, Tetric EvoCeram Bulk Fill composite not recommended to be used as bulk fill restoration in deep cavities and need further studies, while Surefil SDR Flow not recommended to be used in deep cavity when curing tip distance (6-8 mm), in addition we can conclude that the thickness of the increments is more important than light curing tip distance.
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreBackground: Preparation of platelet-rich fibrin (PRF) is a simple, low cost and minimally invasive method to obtain a natural concentration of autologous growth factors that is widely used to accelerate soft and hard tissue healing, thus, PRF is used in different fields of medicine. The aim of this study was to evaluate the effect of local application PRF on stability of dental implants. Materials and methods: nineteen healthy patients with adequate alveolar bone with two or more adjacent missing teeth and/or bilaterally symmetric to the midline (split-mouth design) missing teeth participated in this study. Each patient received at least two dental implants (Dentium Co., Korea). After surgical preparation of the implant sockets, the PRF was
... Show MoreLeishmania is auxotroph to folic acid,antifolates drug inhibit the synthesis and conversion of folate derivatives. In this study, cytotoxic effect of methotrexate was investigated on the procyclic promastigotes proliferation of L. donovani. The results showed a significant (p ≥ 0.05) difference in growth of treated groups at high concentrations (1000, 500, 250, 125.5) μM after 24, 48 hrs., while at 72 hrs. significant difference was observed at all concentration. The IC50 values was measurable after 24, 48 and 72 hrs. and it was 174.238, 52.283 and 109.175 μM, respectively. The present study showed the cytotoxic effect of methotrexate on the proliferation of promastigotes of the visceral type of Leishmania.
This paper investigates the issue of surface-type effects on traffic noise in Baghdad. Since the raw materials for both flexible and rigid paving are available from local sources, the decision on selecting the type of paving which depends on the budget of the project and the road's importance and function. Knowing that for high traffic volumes and a high percentage of heavy vehicles, rigid pavement is more suitable compared to flexible pavement. In Baghdad, some highways consist of flexible pavement and others of combined pavement (flexible segments and rigid segments), so the study of the effect of surface type on traffic noise becomes an important matter. This study selected three highways: one with flexible pavement a
... Show More