This study evaluated the structural changes of enamel treated by the Regenerate system and carbon dioxide (CO2) laser against acid challenge. Thirty human enamel slabs were prepared and assigned into three groups: Group I: untreated (control); Group II: treated with the Regenerate system; and Group III exposed to CO2 laser. All specimens were subjected to an acid challenge (pH 4.5–7.0) for 14 days. Specimens were evaluated and compared at 120 points using five Raman microspectroscopic peaks; the phosphate vibrations ν1, ν2, ν3, and ν4 at 960, 433, 1029, and 579 cm−1, respectively, and the carbonate at 1070 cm−1, followed by Vickers microhardness test. The ratio of carbonate to phosphate was correlated to the equivalent microhardness numbers. The intensities of phosphate peaks ν1, ν2, and ν4 were reduced in all groups post-acid challenge, while the carbonate and ν3 were significantly increased (p < 0.000). Surfaces treated by Regenerate exhibited higher peak intensity of phosphate and carbonate before and after pH-cycling (p < 0.05). The mineral content in enamel had a direct effect on tissue microhardness, and the CO2-lased surfaces showed a reduced carbonate content and higher microhardness values. Both approaches induced surface changes that can protect enamel against acid challenge resulting in a significant benefit for dental healthcare.
the mental image is so important in human life as one of the major standers for his trends and behavior, and as the human nature requires to interest in things based on how much it’s close to and how much it effects on his interest, So the neighborhood countries was one of the topics that occupied the attention of the Iraqi individual and pushed him to form perceptions of them based on the cultural heritage and the historical relations of Iraq with these countries as well as the actions of neighboring countries on Iraq and the resulting effects on the course of events. the mental image is so important in human life as one of the major standers for his trends and behavior, and as the human nature requires to interest in things bas
... Show MoreThe present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of
... Show MoreThe research problem lies in the ambiguity of the usage of propaganda contents by two main media outlets (the Russian RT and American Alhurra) in their news coverage of the Syrian crisis through their websites and the methods used by them to convince users taking into account the mutual propaganda conflict between the United States and Russia in the war against Syria. The objectives of the research can be represented by the following: investigating the contents of American and Russian electronic propaganda towards Syrian crisis.
• Identifying the contents that received most of the coverage in the Syrian crisis by the two news outlets.
• Identifying the terms and phrases that have been most used by the websites of RT and Alhurr
The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More