Statement of the Problem. The use of orthodontic fixed appliances may adversely affect oral health leading to demineralizing lesions and the development of gingival problems. Aims of the Study. The study aimed to coat orthodontic archwires with chlorhexidine hexametaphosphate nanoparticles (CHX-HMP NPs) and to evaluate the elusion of CHX from CHX-HMP NPs. Materials and Methods. A solution of CHX-HMP nanoparticles with an overall concentration of 5 mM for both CHX and HMP was prepared, characterized (using atomic force microscope and Fourier transformation infrared spectroscopy), and used to coat orthodontic stainless steel (SSW) and NiTi archwires (NiTiW). The coated segments were characterized (using scanning electron microscopy SEM with energy dispersive X-ray spectrometry and field emission SEM) and subjected to the elusion assessment. Results. After having their composition validated, the average size of the CHX-HMP NPs was assessed to be 51.21 nm, and the analysis revealed that the particles had both chlorine and phosphorus. After 30 minutes in the coating solution, NPs deposited on the surface of the SSW and NiTiW. A continuous release of soluble CHX in artificial saliva was detected from both SSW and NiTiW as long as the experiment lasted for 28 days without reaching a plateau. However, the release from coated NiTiW was significantly more than coated SSW at 7, 14, and 28 days. While at day 21, the release from coated SSW was slightly greater than that from the coated NiTiW. Conclusion. Orthodontic stainless steel and NiTi archwires can be successfully coated with CHX-HMP NPs and give sustained release of CHX along the examined period.
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModified algae with nano copper oxide (CuO) were used as adsorption media to remove tetracycline (TEC) from aqueous solutions. Functional groups, morphology, structure, and percentages of surfactants before and after adsorption were characterised through Fourier-transform infrared (FTIR), X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive spectroscopy (EDS). Several variables, including pH, connection time, dosage, initial concentrations, and temperature, were controlled to obtain the optimum condition. Thermodynamic studies, adsorption isotherm, and kinetics models were examined to describe and recognise the type of interactions involved. Resultantly, the best operation conditions were at pH 7, contact time
... Show MoreModified algae with nano copper oxide (CuO) were used as adsorption media to remove tetracycline (TEC) from aqueous solutions. Functional groups, morphology, structure, and percentages of surfactants before and after adsorption were characterised through Fourier-transform infrared (FTIR), X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive spectroscopy (EDS). Several variables, including pH, connection time, dosage, initial concentrations, and temperature, were controlled to obtain the optimum condition. Thermodynamic studies, adsorption isotherm, and kinetics models were examined to describe and recognise the type of interactions involved. Resultantly, the best operation conditions were at pH 7, contact time
... Show MoreBackground: Relapse of previously moved teeth, is major clinical problem in orthodontics with respect to the goals of successful treatment. This study investigated the effect of orthodontic relapse on the proliferation of fibroblast and epithelial rests of Malassez cells in periodontal ligament of rat molars. Materials and Methods: Sixteen ten-week- old male Wister rats were randomly divided into four groups composed of four animals each: Group I received no orthodontic force (control). In both Group II and Group III, uniform standardized expansive springs were used for moving the maxillary first molars buccally for periods of one and three weeks respectively. The spring initially generated an average expansive force of 20 g on each side.
... Show More