Objectives: This study aims to assess and compare the micro-shear bond strength (μSBS) of a novel resin-modified glass-ionomer luting cement functionalized with a methacrylate co-monomer containing a phosphoric acid group, 30 wt% 2-(methacryloxy) ethyl phosphate (2-MEP), with different substrates (dentin, enamel, zirconia, and base metal alloy). This assessment is conducted in comparison with conventional resin-modified glass ionomer cement and self-adhesive resin cement. Materials and methods: In this in vitro study, ninety-six specimens were prepared and categorized into four groups: enamel (A), dentin (B), zirconia (C), and base metal alloys (D). Enamel (E) and dentin (D) specimens were obtained from 30 human maxillary first premolars extracted during orthodontic treatment. For zirconia and metal alloys, 48 disks were manufactured using IPS e.max ZirCAD through dry milling and Co–Cr powder alloy by selective laser milling. Each group was further subdivided into three subgroups (n = 8) according to the luting cement used: (1) Fuji PLUS resin-modified glass ionomer luting cement (FP) as a control cement, (2) modified control cement (eRMGIC), and (3) RelyX U 200 (RU 200) self-adhesive resin cement. The two-way analysis of variance and Tukey’s HSD were used to assess the data obtained from measuring the μSBS of the samples. Results: The results of this study showed that the mean μSBS values of eRMGIC were statistically higher compared to FP in all tested groups (p < 0.001). The mean μSBS results of eRMGIC were non-significantly different from those recorded by RU 200 for all substrates except for the dentin substrate, where the RU200 cement produced significantly higher strength (p < 0.001). The failure modes were limited to a combination of mixed and adhesive failures without pure cohesive failure. Significance: The functionalization of FP with an organophosphorus co-monomer (2-MEP) directly affects the adhesion performance of the functionalized cement, which may be utilized to develop a new type of acid-base cement. It exhibited a performance comparable to that of resin-based cement and should serve well under different clinical conditions.
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this work, the synergistic effect of chlorinated rubber (additive I),with zeolite 3A (additive II), zeolite 4A (additive III), and zeolite 5A (additive IV) in (1:1) weight percentage, on the flammability for unsaturated polyester resin was studied in the weight ratios for (3,7,10,13&15%) by preparing films of (130×130×3) mm in diameters. Three standard test methods used to measure were the flame retardation which are; ASTM: D-2863, ASTM: D- 635& ASTM: D-3014. Results obtained from these tests indicated that all of the additives were effective additive IV has the highest efficiency as a flame retardant.
Recently a large number of extensive studies have amassed that describe the removal of dyes from water and wastewater using natural adsorbents and modified materials. Methyl orange dye is found in wastewater streams from various industries that include textiles, plastics, printing and paper among other sources. This article reviews methyl orange adsorption onto natural and modified materials. Despite many techniques available, adsorption stands out for efficient water and wastewater treatment for its ease of operation, flexibility and large-scale removal of colorants. It also has a significant potential for regeneration recovery and recycling of adsorbents in comparison to other water treatment methods. The adsorbents described herein were
... Show MoreIn today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreMethotrexate (MTX) is widely used chemotherapeutic agent with different side effects including germ cells toxicities. Silibinin is one of the structural isomers of silymarin, with different phytotherapeutic applications, and its possible protective effects against MTX induced germ cells damage were investigated in this work. Twenty five male mice were divided into five groups (n=5) allocated as follows: Group 1 received buffer for five days given by single intraperitoneal (IP) injection per day; Group 2 in addition to buffer for five days, animals received at day five single dose of 20mg/kg of MTX IP. Groups (3, 4, and 5) received respectively, (50, 100, or 150mg/kg body weight) of silibinin IP single daily dose for five days then at day fi
... Show More