Background: Prophylaxis methods are used to mechanically remove plaque and stain from tooth surfaces; such methods give rise to loss of superficial structure and roughen the surface of composites as a result of their abrasive action. This study was done to assess the effect of three polishing systems on surface texture of new anterior composites after storage in artificial saliva. Materials and methods: A total of 40 Giomer and Tetric®N-Ceram composite discs of 12 mm internal diameter and 3mm height were prepared using a specially designed cylindrical mold and were stored in artificial saliva for one month and then samples were divided into four groups according to surface treatment: Group A (control group):10 specimens received no surface polish and were subdivided into A1 (Giomer) and A2 (Tetric®N-Ceram). Group B: 10 specimens received polishing with Air polishing devise (APD) and were subdivided into B1 (Giomer) and B2 (Tetric®N-Ceram). Group C: 10 specimens received polishing with pumice and brush and were subdivided into C1 (Giomer) and C2 (Tetric®N-Ceram). Group D: 10 specimens were polished with pumice and rubber cup and were subdivided into D1 (Giomer) and D2 (Tetric®N-Ceram). Testing was done by means of profilometer and statistically analyzed using analysis of variance test (ANOVA), LSD and student t-test. Also samples were photographed by special orthoplane camera using light polarizing microscope. Results: The results showed a highly statistical significant difference in surface roughness among Giomer subgroups P<0.05. Also there was a highly significant difference P<0.05 when comparing Tetric subgroups according to type of surface treatment. Furthermore there was non-significant difference P>0.05 between groups according to the type of restorative material used. Conclusion: The use of prophylactic surface treatment significantly increased Giomer and Tetric ceram surface roughness and the use of rotating brush has shown the roughest surface among all other types of prophylactic protocols also Giomer had shown more surface roughness than Tetric ceram although the difference was not significant.
This study aimed at investigating the effect of using computer in
Efficiency of Training Programme of Science Teachers in Ajloun District in
Jordan.
1- What is the effect of using computer in program for the two groups
2- ( the experimental and control group ) .
3- Are there any statistics different in the effect of using computer
program for the two groups ?
4- Are there any statistics (comparison ) or different of the effect of the
effect of using computer program refer to the sex (male or female )?
The community of the study consisted of all the science student in
educational directorate of Ajloun district for the academic year 2009 –
2010, they are (120) ( male and female) . The sample of the study<
The current research discusses the jurisprudence of the argumentative meaning in the Qur’an, and it is one of the general methods of responses in the Qur’an, as well as the argumentative approach to the recitations of the readers and directing their meanings. I have chosen a model for three verses from Surat Al-An’am, in which there are seven frequent recitations and seven odd ones, on a topic related to theology and faith; It forms the centerpiece of the argument verses in Surat Al-An'am; It contains the jurisprudence of dealing with infidels and dissenters, turning away and forbidding insulting what they claim besides God in the event of corruption, and God Almighty’s decree and wisdom in the occurrence of unbeli
... Show Moreoupling reaction of 4-aminoantipyrene with the (L-Histidine) gave the new bidentate azo ligand.The prepared ligand was identified by FT.IR, UV-Vis and HNMR spectroscopics technique. Treatment of the prepared ligand was done with the following metal ions (Ag+ ,Pb+2 ,Fe+3 ,Cr+3 ) in aqueous ethanol with a1:1 and 1:2 M:L ratio . The prepared complexes were characterized by using FT. IR and UV- VIS spectroscopic method as well as conductivity measurements. Their structures were suggested according to the results obtained.
The new compounds of pyrazolines were synthesized from the reaction of different acid hydrazide with ethylacetoacetate and ethanol under reflux. These compounds were obtained from many sequence reactions. The 4-acetyl-5-methyl-2,4-dihydro-3H-pyrazol-3-one compounds synthesized from the reaction of 5-methyl-2,4-dihydro-3H-pyrazol-3-one with acetyl chloride in calcium hydroxide and 1,4-dioxane. Finaly, Schiff bases were prepared via condensation reaction of products of mono- and tri ketone derivatives[IV]a, b with phenyl hydrazines as presented in (Scheme 1, 2). The synthesized compounds were identification by using FTIR, NMR and Mass spectroscopy (of some of them).
A variety of liquid crystals comprising heterocyclics 1,3,4-oxadiazol ring [III], aminooxazol [IV]a, and aminothiazol [IV]b were synthesized through a number of steps, beginning of the reaction of 3, 3'- dimethyl - [1, 1'-biphenyl] -4, 4'- diamin, ethyl monochloroacetate and sodium acetate to synthesize diacetate compound[I]. The diester reacted with hydrazine hydrate(N2H4-H2O) to give dihydrazide compound [II], then reacted with Pyruvic acid and phosphorous oxychloride to produce diketone compound [III]. The last compound was reacted with urea and thiourea to give aminooxazol and aminothiazol respectively. The synthesized compounds actually characterized and determined the structures by melting points, FT-IR and 1H-NMR spectroscopies. By u
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreNew data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show More