Objectives: This study aims to assess and compare the micro-shear bond strength (μSBS) of a novel resin-modified glass-ionomer luting cement functionalized with a methacrylate co-monomer containing a phosphoric acid group, 30 wt% 2-(methacryloxy) ethyl phosphate (2-MEP), with different substrates (dentin, enamel, zirconia, and base metal alloy). This assessment is conducted in comparison with conventional resin-modified glass ionomer cement and self-adhesive resin cement. Materials and methods: In this in vitro study, ninety-six specimens were prepared and categorized into four groups: enamel (A), dentin (B), zirconia (C), and base metal alloys (D). Enamel (E) and dentin (D) specimens were obtained from 30 human maxillary first premolars extracted during orthodontic treatment. For zirconia and metal alloys, 48 disks were manufactured using IPS e.max ZirCAD through dry milling and Co–Cr powder alloy by selective laser milling. Each group was further subdivided into three subgroups (n = 8) according to the luting cement used: (1) Fuji PLUS resin-modified glass ionomer luting cement (FP) as a control cement, (2) modified control cement (eRMGIC), and (3) RelyX U 200 (RU 200) self-adhesive resin cement. The two-way analysis of variance and Tukey’s HSD were used to assess the data obtained from measuring the μSBS of the samples. Results: The results of this study showed that the mean μSBS values of eRMGIC were statistically higher compared to FP in all tested groups (p < 0.001). The mean μSBS results of eRMGIC were non-significantly different from those recorded by RU 200 for all substrates except for the dentin substrate, where the RU200 cement produced significantly higher strength (p < 0.001). The failure modes were limited to a combination of mixed and adhesive failures without pure cohesive failure. Significance: The functionalization of FP with an organophosphorus co-monomer (2-MEP) directly affects the adhesion performance of the functionalized cement, which may be utilized to develop a new type of acid-base cement. It exhibited a performance comparable to that of resin-based cement and should serve well under different clinical conditions.
Background: The incorporation of rubber has not been entirely successful because it can have detrimental effects on the transverse Strength and hence the rigidity of the denture base. Materials and methods: Zirconium oxide nanoparticales were coated with a layer of trimethoxysilylpropylmethacrylate (TMSPM) before sonication in monomer (MMA) with the percentages 3% by weight then mixed with powder using conventional procedure.(100) samples were prepared and divided into five groups according to the test performed ,Each group consisted of 20 specimens and these were subdivided into 2 groupsGroup (A): control group (10 specimens of high impact acrylic resin without zirconium oxide) and Group (B):zirconium oxide group(10 specimens of high impac
... Show MorePraise to Allah, Lord of the Worlds. Thank you very much. Blessed. As his face should be majestic and great. His authority, and may peace and blessings be upon our master Muhammad, a perpetual blessing until the Day of Judgment
And upon the God of purity, His righteous companions, and those who follow them in righteousness until the Day of Judgment. But after:-
Anyone who looks into the history of nations, peoples, and the conditions of human beings will see that naturalization as a person’s affiliation to a particular state is something that happened only in recent centuries. In ancient times, a person’s loyalty was to the tribe to which the person belonged, and he was integrated into it and attributed to it, and in
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Background: Incorporation of chemical additives has long been a technique used to improve properties of the gypsum products. The purpose of this work was to study the effects of adding a combination of gum Arabic and calcium hydroxide to a type III dental stone and type IV improved die stone with different proportion. The effect on water/powder ratio, and surface hardness was determined. Material and method: Both material stone and die stone were blended with two proportion of additives so that each material was mixed twice but with different proportion of gum Arabic (0.1% and 0.2%) and calcium hydroxide (0.5 % and 0.3%). Data for hardness were subjected to two-way analysis of variance. Results: The results revealed that the chemical additi
... Show MoreRecently a large number of extensive studies have amassed that describe the removal of dyes from water and wastewater using natural adsorbents and modified materials. Methyl orange dye is found in wastewater streams from various industries that include textiles, plastics, printing and paper among other sources. This article reviews methyl orange adsorption onto natural and modified materials. Despite many techniques available, adsorption stands out for efficient water and wastewater treatment for its ease of operation, flexibility and large-scale removal of colorants. It also has a significant potential for regeneration recovery and recycling of adsorbents in comparison to other water treatment methods. The adsorbents described herein were
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreIn today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har
... Show MoreAbstract
Bivariate time series modeling and forecasting have become a promising field of applied studies in recent times. For this purpose, the Linear Autoregressive Moving Average with exogenous variable ARMAX model is the most widely used technique over the past few years in modeling and forecasting this type of data. The most important assumptions of this model are linearity and homogenous for random error variance of the appropriate model. In practice, these two assumptions are often violated, so the Generalized Autoregressive Conditional Heteroscedasticity (ARCH) and (GARCH) with exogenous varia
... Show More