It is found that hypersensitive teeth have a larger number and wider patent tubules than those of non-sensitive teeth. Objective: The aim of this study is to compare between the effects of diode laser at different power densities, with and without sodium fluoride on the sealing of exposed dentinal tubules and dentin permeability. Materials and methods: 118 teeth were used. Samples were divided into three major groups. The first consisted of 100 teeth used for permeability test. The second consisted of 16 teeth for measuring external surface temperature elevation while irradiation. The third, in turn, consisted of one pair of teeth observed under SEM for dentine surface morphology analysis. Results: For dentin permeability measurement, the results revealed a highly significant difference between the control group and 2, 3 W with varnish groups. For the external surface temperature elevation, the results revealed that temperature rise, for both laser alone and with varnish groups, was between (67-97.9 ∘C) at 1.6, 2 W. SEM analysis revealed that approximately optimum sealing of tubules occurred in 2W with the varnish group. Conclusions: The combined application of 940 nm diode laser at 2W with 809.7 W/cm² power densities, with sodium fluoride white varnish show a significant improvement in their effects on dentin permeability reduction as compared to each treatment alone.
Image content verification is to confirm the validity of the images, i.e. . To test if the image has experienced any alteration since it was made. Computerized watermarking has turned into a promising procedure for image content verification in light of its exceptional execution and capacity of altering identification.
In this study, a new scheme for image verification reliant on two dimensional chaotic maps and Discrete Wavelet Transform (DWT) is introduced. Arnold transforms is first applied to Host image (H) for scrambling as a pretreatment stage, then the scrambled host image is partitioned into sub-blocks of size 2×2 in which a 2D DWT is utilized on ea
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreWe define skew matrix gamma ring and describe the constitution of Jordan left centralizers and derivations on skew matrix gamma ring on a -ring. We also show the properties of these concepts.
Psidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThe paper starts with the main properties of the class of soft somewhere dense open functions and follows their connections with other types of soft open functions. Then preimages of soft sets with Baire property and images of soft Baire spaces under certain classes of soft functions are discussed. Some examples are presented that support the obtained results. Further properties of somewhere dense open functions related to different types of soft functions are found under some soft topological properties.
Abstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreIn this article, the additivity of higher multiplicative mappings, i.e., Jordan mappings, on generalized matrix algebras are studied. Also, the definition of Jordan higher triple product homomorphism is introduced and its additivity on generalized matrix algebras is studied.