Background: This in vitro study compares a novel calcium-phosphate etchant paste to conventional 37% phosphoric acid gel for bonding metal and ceramic brackets by evaluating the shear bond strength, remnant adhesive and enamel damage following water storage, acid challenge and fatigue loading. Material and Methods: Metal and ceramic brackets were bonded to 240 extracted human premolars using two enamel conditioning protocols: conventional 37% phosphoric acid (PA) gel (control), and an acidic calcium-phosphate (CaP) paste. The CaP paste was prepared from β-tricalcium phosphate and monocalcium phosphate monohydrate powders mixed with 37% phosphoric acid solution, and the resulting phase was confirmed using FTIR. The bonded premolars were exposed to four artificial ageing models to examine the shear bond strength (SBS), adhesive remnant index (ARI score), with stereomicroscopic evaluation of enamel damage. Results: Metal and ceramic control subgroups yielded significantly higher (p ˂ 0.05) SBS (17.1-31.8 MPa) than the CaP subgroups (11.4-23.8 MPa) post all artificial ageing protocols, coupled with higher ARI scores and evidence of enamel damage. In contrast, the CaP subgroups survived all artificial ageing tests by maintaining adequate SBS for clinical performance, with the advantages of leaving unblemished enamel surface and bracket failures at the enamel-adhesive interface. Conclusions: Enamel conditioning with acidic CaP pastes attained adequate bond strengths with no or minimal adhesive residue and enamel damage, suggesting a suitable alternative to the conventional PA gel for orthodontic bonding.
Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreToday’s academics have a major hurdle in solving combinatorial problems in the actual world. It is nevertheless possible to use optimization techniques to find, design, and solve a genuine optimal solution to a particular problem, despite the limitations of the applied approach. A surge in interest in population-based optimization methodologies has spawned a plethora of new and improved approaches to a wide range of engineering problems. Optimizing test suites is a combinatorial testing challenge that has been demonstrated to be an extremely difficult combinatorial optimization limitation of the research. The authors have proposed an almost infallible method for selecting combinatorial test cases. It uses a hybrid whale–gray wol
... Show MoreThis paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The n
A land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThis research a study model of linear regression problem of autocorrelation of random error is spread when a normal distribution as used in linear regression analysis for relationship between variables and through this relationship can predict the value of a variable with the values of other variables, and was comparing methods (method of least squares, method of the average un-weighted, Thiel method and Laplace method) using the mean square error (MSE) boxes and simulation and the study included fore sizes of samples (15, 30, 60, 100). The results showed that the least-squares method is best, applying the fore methods of buckwheat production data and the cultivated area of the provinces of Iraq for years (2010), (2011), (2012),
... Show MoreBackground: This study aimed to determine the value of Beta angle for a sample of Iraqi adults with class I skeletal and dental relations and to verify the existence of sexual dimorphism and to find out the relation between this angle and other craniofacial measurements. Materials and Methods: Sixty dental students (23 males and 37 females) with an age ranged between 20-31 years old and having class I skeletal and dental relations were chosen for this study. Each student was subjected to clinical examination and digital true lateral cephalometric radiograph. The radiographs were analyzed using AutoCAD 2007 computer program to measure the angular and linear variables. Descriptive statistics were obtained for the measurements for both genders
... Show MoreBackground: Obesity is considered an important risk factor for periodontal disease. It has been reported that reactive oxygen species linking both diseases, systemic melatonin supplementation as antioxidant therapy, was addressed as an adjuvant to scaling and root surface debridement (SRP) to enhance the treatment of periodontitis. Objective: To investigate the efficacy of systemic melatonin administration in periodontitis-obese patients as an adjuvant to scaling and root surface debridement (SRP). Methods: A randomized clinical trial was conducted at a dental-specialized center. Eighty subjects were included and allocated into group-I: twenty periodontium-healthy, normal-weight people; group-II: 30 obese patients with stage-III tre
... Show More