Background: One of the most common problem associated with the used of soft denture lining material is microorganisms and fungal growth especially Candida albicans, which can result in chronic mucosal inflammation. The aim of this study was to evaluate the influence of chlorhexidine diacetate (CDA) salt Incorporation into soft denture lining material on antifungal activity; against Candida albicans, and the amount of chlorhexidine di-acetate salt leached out of soft liner/CDA composite. Furthermore, evaluate shear bond strength and hardness after CDA addition to soft liner Materials and methods: chlorhexidine diacetate salt was added to soft denture lining material at four different concentrations (0.05%, 0.1% and 0.2% by weight). Four hundred and fifty specimens were made and divided into four groups according to the test to be performed. Disk diffusion test was used to evaluate the antifungal activity of the soft liner/CDA composite after four different periods of incubation in artificial saliva. UV spectroscopy was used to evaluate the amount of accumulative and periodic CDA released in artificial saliva after 2 days, 2 weeks and 4 weeks incubation in artificial saliva. The shear bond strength and shore A hardness was measured after 2 and 4 weeks incubation in artificial saliva and the results were statistically analyzed. Results: All experimental groups showed a highly significant increase in diameter of inhibition zone around the test specimen in compare with control group. The release of Chlorhexidine showed to be dose dependent. The shore A hardness a highly significant increase with the addition of CDA and as for shear bonding strength, the addition of CDA at 0.5% and 1.5% percentage resulted in a highly significant decrease in bond strength, while 2.5% and 3.5% percentage showed non-significant differences in compare with control. Conclusion: soft denture lining material with antifungal properties was the result of CDA salt incorporation which indicate that chlorhexidine was released in affected concentration from soft liner/CDA composite. This incorporation resulted in Hardness increase and did not affect the shear bond strength for 2.5% and 3.5% percentage. Keywords: Soft denture liners, antifungal activity, chlorhexidine diacetate salt.
In many areas, such as simulation, numerical analysis, computer programming, decision-making, entertainment, and coding, a random number input is required. The pseudo-random number uses its seed value. In this paper, a hybrid method for pseudo number generation is proposed using Linear Feedback Shift Registers (LFSR) and Linear Congruential Generator (LCG). The hybrid method for generating keys is proposed by merging technologies. In each method, a new large in key-space group of numbers were generated separately. Also, a higher level of secrecy is gained such that the internal numbers generated from LFSR are combined with LCG (The adoption of roots in non-linear iteration loops). LCG and LFSR are linear structures and outputs
... Show MoreThe concepts of higher Bi- homomorphism and Jordan higher Bi- homomorphism have been introduced and studied the relation between Jordan and ordinary higher Bi- homomorphism also the concepts of Co- higher Bi- homomorphism and Co- Jordan higher Bi- homomorphism introduced and the relation between them in Banach algebra have also been studied.
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreIn The Name of Allah Most Gracious Most Merciful
The reason for choosing this topic was:
First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.
Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).
Third: The study of the jurisprudence of the companions
The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More