Background: One of the most common problem associated with the used of soft denture lining material is microorganisms and fungal growth especially Candida albicans, which can result in chronic mucosal inflammation. The aim of this study was to evaluate the influence of chlorhexidine diacetate (CDA) salt Incorporation into soft denture lining material on antifungal activity; against Candida albicans, and the amount of chlorhexidine di-acetate salt leached out of soft liner/CDA composite. Furthermore, evaluate shear bond strength and hardness after CDA addition to soft liner Materials and methods: chlorhexidine diacetate salt was added to soft denture lining material at four different concentrations (0.05%, 0.1% and 0.2% by weight). Four hundred and fifty specimens were made and divided into four groups according to the test to be performed. Disk diffusion test was used to evaluate the antifungal activity of the soft liner/CDA composite after four different periods of incubation in artificial saliva. UV spectroscopy was used to evaluate the amount of accumulative and periodic CDA released in artificial saliva after 2 days, 2 weeks and 4 weeks incubation in artificial saliva. The shear bond strength and shore A hardness was measured after 2 and 4 weeks incubation in artificial saliva and the results were statistically analyzed. Results: All experimental groups showed a highly significant increase in diameter of inhibition zone around the test specimen in compare with control group. The release of Chlorhexidine showed to be dose dependent. The shore A hardness a highly significant increase with the addition of CDA and as for shear bonding strength, the addition of CDA at 0.5% and 1.5% percentage resulted in a highly significant decrease in bond strength, while 2.5% and 3.5% percentage showed non-significant differences in compare with control. Conclusion: soft denture lining material with antifungal properties was the result of CDA salt incorporation which indicate that chlorhexidine was released in affected concentration from soft liner/CDA composite. This incorporation resulted in Hardness increase and did not affect the shear bond strength for 2.5% and 3.5% percentage. Keywords: Soft denture liners, antifungal activity, chlorhexidine diacetate salt.
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreAny software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Color image compression is a good way to encode digital images by decreasing the number of bits wanted to supply the image. The main objective is to reduce storage space, reduce transportation costs and maintain good quality. In current research work, a simple effective methodology is proposed for the purpose of compressing color art digital images and obtaining a low bit rate by compressing the matrix resulting from the scalar quantization process (reducing the number of bits from 24 to 8 bits) using displacement coding and then compressing the remainder using the Mabel ZF algorithm Welch LZW. The proposed methodology maintains the quality of the reconstructed image. Macroscopic and