Background: Coated aesthetic archwires are currently the existing solutions for the esthetic problem, but the color of these archwires tends to change overtime. This study was aimed to evaluate the color stability of different types of esthetic archwires from four different companies at different time periods after immersion of two different staining drinks which are tea and Pepsi cola. Materials and methods: 48 specimens were prepared, each specimen contains 10 aesthetic archwires; and were divided according to type of solution into two groups: A (tea) &B (Pepsi cola); each group contained 24 specimens (12 specimens were immersed in the staining solution as 4 specimens for each time intervals and 12 specimens were immersed in distilled water as control group). Each subgroup contains one specimen from each company. Color measurements were performed by means of a computed spectrophotometer according to the Commission Internationale de I’Eclairage L*a*b* system, and color changes (ΔE*) and National Bureau of Standards units. Results: Both staining solution caused color change in variable degree and the higher amount of color instability was found for the archwires from the Hubit Company while the least amount of color change was for the archwires from the Orthotechnology Company. Conclusion: The tea caused highly significant change on the aesthetic archwires which is higher than the effect of the Pepsi cola. Key words: Color stability, aesthetic archwires, staining drinks.
Sustainability is providing the needs without compromising the ability of the strategical forming to meet their requirements. The production of warm asphalt mixtures using recycled pavements produces economic and environmentally friendly mixtures, which is the most important advantage of this work. This research aims to determine the effect of recycled asphalt concrete (RAP) on the indirect tensile strength of warm asphalt mixtures and Marshall Properties. Models of warm asphalt mixtures using Aggregate from the Al-Nibaay quarry, Asphalt with a degree of penetration (40-50) from the refinery of the cycle, and obtained Recycled asphalt concrete from Salah Al-Din Road, Al-Ameriya area in Baghdad are prepared. Use five rati
... Show MoreThe present study was conducted on the Iraqi Pin-tailed Sandgrouse (Pterocles alchata) to study the lung's morphological description and histological structure. This study was used 5 samples of adult male sandgrouse bird. The birds were dissected. The lungs were removed from the coelomic cavity, cleaned to remove impurities, and photographed to describe their morphological features. The samples were fixed using formalin (10%) solution for 36-48 hours and then preserved in alcohol (70%) to prepare the microscopic slides. The results showed that the lung of the Iraqi sandgrouse bird is red in color, has a trapezoidal shape and has three surfaces (costal, visceral, and vertebral). The costal surface shows ribs impressions that extend f
... Show MoreIn 1939, the Japanese scientist Michio Takaoka first mentioned resveratrol from Veratrum grandiflorum O. Loes. Majority of plants, such as grapes, berries, and peanuts, are significant sources of resveratrol, a well-known polyphenolic. resveratrol (RV) is noted for its links to several health care benefits, including glucose metabolism, anti-aging, cardioprotective, neuroprotective, antitumor, antidiabetic, and antioxidant effects. Importantly, there have been reports of promising therapeutic qualities in atherosclerosis, dementia, and various malignancies. These properties are controlled through a number of cooperative techniques, which control inflammation besides the effects of oxidative stress and cell death. However, circulating resver
... Show MoreRemote surveying of unknown bound geometries, such as the mapping of underground water supplies and tunnels, remains a challenging task. The obstacles and absorption in media make the long-distance telecommunication and localization process inefficient due to mobile sensors’ power limitations. This work develops a new short-range sequential localization approach to reduce the required amount of signal transmission power. The developed algorithm is based on a sequential localization process that can utilize a multitude of randomly distributed wireless sensors while only employing several anchors in the process. Time delay elliptic and frequency range techniques are employed in developing the proposed algebraic closed-form solution.
... Show MoreThe Indoor Environmental Quality (IEQ) describes an indoor space condition that the wellbeing and comfortability are provided for the users. Many researchers have highlighted the importance of adopting IEQ criteria, although they are not yet well defined in the Kurdistan region. However, environmental quality is not necessary for the contemporary buildings of the Kurdistan Region, and there is no measurement tool in the Region. This research aims to develop an IEQ assessment tool for the Kurdistan region using Mixed method methodology, both qualitative and quantitative. Therefore, a Delphi Technique was used as a method initially developed as systematic, interactive forecasting on a panel of experts. Thirty-five Delphi C
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.