Background: This in vitro study compares a novel calcium-phosphate etchant paste to conventional 37% phosphoric acid gel for bonding metal and ceramic brackets by evaluating the shear bond strength, remnant adhesive and enamel damage following water storage, acid challenge and fatigue loading. Material and Methods: Metal and ceramic brackets were bonded to 240 extracted human premolars using two enamel conditioning protocols: conventional 37% phosphoric acid (PA) gel (control), and an acidic calcium-phosphate (CaP) paste. The CaP paste was prepared from β-tricalcium phosphate and monocalcium phosphate monohydrate powders mixed with 37% phosphoric acid solution, and the resulting phase was confirmed using FTIR. The bonded premolars were exposed to four artificial ageing models to examine the shear bond strength (SBS), adhesive remnant index (ARI score), with stereomicroscopic evaluation of enamel damage. Results: Metal and ceramic control subgroups yielded significantly higher (p ˂ 0.05) SBS (17.1-31.8 MPa) than the CaP subgroups (11.4-23.8 MPa) post all artificial ageing protocols, coupled with higher ARI scores and evidence of enamel damage. In contrast, the CaP subgroups survived all artificial ageing tests by maintaining adequate SBS for clinical performance, with the advantages of leaving unblemished enamel surface and bracket failures at the enamel-adhesive interface. Conclusions: Enamel conditioning with acidic CaP pastes attained adequate bond strengths with no or minimal adhesive residue and enamel damage, suggesting a suitable alternative to the conventional PA gel for orthodontic bonding.
Abstract
The research aims to investigate the existence of correlations and influence between agricultural insurance risk management and economic development in the National Insurance Company with farmers, as agriculture is one of the leading branches of the national economy, ensuring food security and eliminating poverty to ensure sustainable ec
... Show MoreThe study is situated in the Kokoe Region of Central Buton Regency, Southeast Sulawesi, specifically in the southern part of Kabaena Island. Its primary objective is to assess the potential of nickel laterite in the designated area. The research methodology involved microscopic analysis of bedrock using a polarizing microscope, examining the drilling data, including logging descriptions, and utilizing XRF geochemical analysis (Ni, Fe, Al2O3, Co, Mg, and SiO2) from 32 drilling sites. Both elementary grade and laterite profiles were visualized using Strater 5 software to simplify the representation of laterite profiles. Petrographic analysis divided the bedrock into two lithological units: serpentinized lherzolite and serpentinite. Th
... Show MoreAl-Naymi, N.A.Sh., H.A.S. AL-Nuaimi and M.R. Nashaat. 2022. Toxicity Stress of the Durah Power Plant Ash and its Effect on the Alga Chlorococcum humicola (Naeg) Rabenhorst 1868. Arab Journal of Plant Protection, 40(2): 188-192. https://doi.org/10.22268/AJPP-040.2.188192 This study illustrates the acute toxic effect of ash released from Durah power plant (DPP) on the biology of the phytoplankton species Chlorococcum humicola in Iraq. The results showed that the median lethal concentration for killing 50% of the Alga population (LC50) was 0.15 and 0.13 ppt (parts per thousand) for 24 and 48 hours exposure to crude ash concentrations, respectively. In contrast, no LC50 value was recorded for 72 and 96 hrs after exposure. The reduction
... Show MoreIn the present study, the effect of new cross-section fin geometries on overall thermal/fluid performance had been investigated. The cross-section included the base original geometry of (triangular, square, circular, and elliptical pin fins) by adding exterior extra fins along the sides of the origin fins. The present extra fins include rectangular extra fin of 2 mm (height) and 4 mm (width) and triangular extra fin of 2 mm (base) 4 mm (height). The use of entropy generation minimization method (EGM) allows the combined effect of thermal resistance and pressure drop to be assessed through the simultaneous interaction with the heat sink. A general dimensionless expression for the entropy generation rate is obtained by con
... Show MoreA series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreBackground: Oncogenesis in the oral cavity is widely believed to result from cumulative genetic alterations that cause a transformation of the mucosa from normal to dysplastic to invasive carcinoma. The p16 gene produces p16 protein, which in turn inhibits phosphorylation of retinoblastoma (Rb), p16 play a significant role in early carcinogenesis. A number of epidermal growth factor receptor (EGFR) family, HER2/neu, has received much attention because of its therapeutic implications. The aims of the study were to evaluate and compare the immunohistochemical expression of the cell cycle protein P16 INK4a and c-erbB2 (HER2/neu) in NOM, OED, and OSCC. Correlate both marker expression with each other as well as with various clinicopathological
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBackground: COVID-19 pandemic has influenced all life aspects; Dental staff, like other healthcare providers, may be exposed to COVID-19 as part of their work and its psychological impacts on healthcare workers should not be ignored
Objectives: To assess the anxiety, and fear from COVID-19 pandemic in dentists working in specialist dental centers: sample the Al-Resafa health directorate, and its relation between the anxiety, and COVID-19 fear with some of their demographic variables
Subjects and Methods: A cross-sectional study was conducted on 2nd Jan. to 14th Feb. 2021, by an electronic version of questionnaire through Google-form; the questionnaire was formed based on Mental-Health-American-Org
... Show MoreAutomatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t
... Show More