ABSTRACT Background: Bracket rebonding is a common problem in orthodontics which may result in many drawbacks. The aims of this study were to evaluate the effects of application of two enamel protective agents “Icon†and “ProSeal†on shear bond strength before and after rebonding of stainless steel orthodontic brackets using conventional orthodontic adhesive and to assess the site of bond failure. Materials and methods: Fifty sound extracted human upper first premolar teeth were selected and randomly divided into two equal groups; the first time bonding and the rebonding groups (n=30). Each group was subdivided into control, Icon and ProSeal subgroups. The enamel protective agents were applied after etching (precondi
... Show MoreObjective: Assessment of health problems and identify demographical information to elderly. Methodology:
it is a descriptive study, data were collected by the researchers depended on the direct interview with the
elderly by using the study instrument (questionnaire) as well as review the records of the geriatric.
Results: The majority of study sample (66%) were males and (24.3%) were within age group (70-74) years,
(44.7%) were widows, and (41.7%) did not read and write. This study applied the international classification
of diseases(short-table) in (11) items, which stated that most of the elderly were complaining from
health problems: debility of hearing (80.65%), eczema or allergies (69.35%), debility of vision (66.9
Burnishing improves fatigue strength, surface hardness and decrease surface roughness of metal because this process transforms tensile residual stresses into compressive residual stresses. Roller burnishing tool is used in the present work on low carbon steel (AISI 1008) specimens. In this work, different experiments were used to study the influence of feed parameter and speed parameter in burnishing process on fatigue strength, surface roughness and surface hardness of low carbon steel (AISI 1008) specimens. The first parameter used is feed values which were (0.6, 0.8, and 1) mm at constant speed (370) rpm, while the second parameter used is speed at values (540, 800 and 1200) rpm and at constant feed (1) mm. The results of the fatigue
... Show MoreObjective: the objective of this study was to compare the intraoperative blood loss, intraoperative time, postoperative pain and secondary hemorrhage between electrodissection and cold steel dissection tonsillectomy.
Methods: One hundred and six patients were enrolled in this study, the patients were randomly allocated into electrodissection group A (n=51) and cold steel dissection tonsillectomy group B (n=53). All patients are above 7 years and had history of recurrent tonsillitis and/or tonsillar hypertrophy with obstructive symptoms. Intraoperative parameters and postoperative outcome were assessed.
Results: In group A patients had statically significa
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed
Most includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met
... Show More