Background: Ceramic veneers represent the treatment of choice in minimally invasive esthetic dentistry; one of the critical factors in their long term success is marginal adaptation. The aim of the present study is to evaluate the marginal gap of ceramic veneers by using two different fabrication techniques and two different designs of preparation. Material and methods: A typodont maxillary central incisor used in the preparation from which metal dies were fabricated, which were in turn used to make forty stone dies. The dies divided into four experimental groups, each group had ten samples: A1: prepared with butt-joint incisal reduction and restored with IPS e.max CAD, A2: prepared with overlapped incisal reduction and restored with IPS e.max CAD. B1: prepared with butt-joint incisal reduction restored with IPS e.max press. B2: prepared with overlapped incisal reduction and restored with IPS e.max press. The marginal gap was measured with direct view technique using digital microscope at a magnification of 230x. Measurements were recorded for four surfaces for each sample and the maximum value was taken to represent that sample. Results: The data were analyzed with two-way ANOVA and independent samples t-tests. These tests revealed highly significant effects of both the preparation design and the technique of fabrication on the marginal gap (p=0.00), with CAD/CAM veneers, group A1 recorded the least marginal gap and pressing group, B2 showed the highest gap values. There was no significant effect of the interaction between the two parameters on the marginal gap. Conclusion: the CAD/CAM veneers with butt joint incisal reduction produced the most accurate margins while the least favorable combination was the pressable ceramic veneers with overlapped incisal reduction.
The harmonic oscillator (HO) and Gaussian (GS) wave functions within the binary cluster model (BCM) have been employ to investigate the ground state neutron, proton and matter densities as well as the elastic form factors of two- neutron 6He and 16C halo nuclei. The long tail is a property that is clearly revealed in the density of the neutrons since it is found in halo orbits. The existence of a long tail in the neutron density distributions of 6He and 16C indicating that these nuclei have a neutron halo structure. Moreover, the matter rms radii and the reaction cross section (𝜎𝑅 ) of these nuclei have been calculated using the Glauber model.
The main objective of the audit is The asset is maintained and operated efficiently and is done through to detect fraud and errors in the financial statements and to verify the accuracy and accuracy of the information contained therein and to give a neutral technical opinion on the basis of that, thus the auditor has a professional responsibility in achieving this goal, and that the effects of issuing a wrong opinion works on The loading of the beneficiaries is significant damage, And therefore the presence of any error or bias of the auditor when taking personal judgments in relation to the determination of the relative importance and the selection of audit samples and determine the adequacy and validity of evidence and implemen
... Show MoreThis research aims to demonstrate the nature and concept of the Corona pandemic, its implications for the global economy, and the management and performance of companies in particular. Additionally, the research intends to measure the impact of the Corona pandemic on companies' financial performance. Listed on the Iraqi Stock Exchange, which has finished compiling its year-end financial statements for 2019-2020. The investigation arrived at several findings, the most significant of which was that most businesses were not prepared for such a crisis technologically or to develop human resources to deal with this pandemic. In addition, most companies experienced a decrease in their financial performance as a direct result of the Corona pandemi
... Show MoreIt is more beneficial science and created and the highest honor is the Koran Sciences, God has honored research in this fun science, came this research that shed the light on the radical incision, and Naughty derivatives as contained in the Koran, and illustrate the diversity of Saghma morphological, and fork them from derivatives what it entailed connotations, as well as the evacuation of cryptic in some of these verses from the biological secrets take minds newly exposed Anitrjt science under the name of scientific miracles.
The research methodology is revenue verse which included the word, and revenue lexical meaning and its meaning in the context of the Qur'an, and reflect the views of the commentators of the verse, and then the r
Abstract
Leadership has now become a process for applying methods and techniques that make the Organization at the top of its competitive pyramid a greater market share. Leadership has become a focus for all leaders and managers، and leaders and managers are increasingly seeking to develop their skills and leadership skills. The research started with a clear problem of specific questions to ensure that the general objective of the research is to describe the characteristics of the leader and to clarify the dimensions of empowering the workers and to highlight the role of the leader in empowering the workers. The study examines the relation between the role of the leader in
... Show More2- amino -5- thiol-1,3,4- thiadiazole (S1) was prepared by cyclic locking of thiosemicarbazide in the presence of anhydrous sodium carbonate and CS2. diazotization of (S1) compound gave diazonium salt (S2) that reacts with different activated aromatic compounds to get the following azo compounds ,2 [(4- aminophenyl) diazenyl ] 1,3,4- thiazdiazole-5- thiol (S3) ,2-[4-amino- 1-naphthyl diazenyl] -1,3,4 – thiazdiazole-5-thiol (S4) , 3-amino-4-[(5- mercapto -1,3,4- thiadiazole -2-yl) diazenyl ] phenol(S5) ,1-[(5-mercapto-1,3,4-thiadiazole-2-yl) diazenyl] -2-naphthol (S6) , 5-{[4-(dimethylamino) phenyl] diazenyl}-1,3,4-thiadiazole-2- thiol(S7) ,5-{[4-(diethylamino) phenyl] diazenyl}-1,3,4- thiadiazole-2- thiol(S8) ,2- amino-5-[(5-mercapto-1,3
... Show MoreIn this study, synthesised new ligand: potassium 2,2'-(quinoxaline-2,3- diyl)bis(1-phenylhydrazinecarbodithioate) (L). The ligand synthesised by reacting N1,N2-dip-tolyloxalamide as the starting material with CS2 and KOH to add the CS2 group and then with phenylendiammine to achieve (L). The ligand used in the synthesis of complexes with (CoII, NiII and CdII). The new ligand and its complexes characterised by FT-IR, UV-Vis, 1H, 13C-NMR, Mass spectroscopy, and elemental analysis, in addition to the above techniques were using magnetic moment, atomic absorption, chloride content, and melting point to describe the metal complexes.
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More