Preferred Language
Articles
/
jbcd-1758
The Effects of Enamel Protective Agents on Shear Bond Strength After Rebonding of Stainless Steel Orthodontic Bracket (An in Vitro Study)
...Show More Authors

ABSTRACT Background: Bracket rebonding is a common problem in orthodontics which may result in many drawbacks. The aims of this study were to evaluate the effects of application of two enamel protective agents “Icon” and “ProSeal” on shear bond strength before and after rebonding of stainless steel orthodontic brackets using conventional orthodontic adhesive and to assess the site of bond failure. Materials and methods: Fifty sound extracted human upper first premolar teeth were selected and randomly divided into two equal groups; the first time bonding and the rebonding groups (n=30). Each group was subdivided into control, Icon and ProSeal subgroups. The enamel protective agents were applied after etching (preconditioners). Shear bond strength before and after rebonding of stainless steel brackets were assessed using the Universal testing machine and the adhesive remnant index was used to find out the bond failure site using a stereomicroscope. Then the results were statistically analyzed using one-way ANOVA analysis test and T-test. Results: There were no significant differences in the shear bond strength mean values in either group or their corresponding subgroups. Forty percentage of the bond failure in ProSeal groups occurred away from the enamel where 75% of those were at the enamel protective agents/adhesive interface. Conclusions: The application of Icon and ProSeal did not compromise the shear bond strength and the application of the ProSeal may protect the enamel surface from trauma (cracks, chipping or detachment).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 15 2015
Journal Name
Chemistry And Materials Research
Synthesis and Characterization of 3, 5-Dimethyl-2-(4-nitrophenyl azo)-Phenol Complexes with Co (II) and Ni (II) and Study Its Effect on the Activity of Ach Enzyme (invitro)
...Show More Authors

Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
Discretionary Punishment (Al-Ta'zir) for the Interest and its Effect in Keeping the Public Regulation A Fundamental Applied Study in the Saudi Arabian Courts
...Show More Authors

Discretionary Punishment, Public Regulation, Interest

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jun 29 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications (ijnaa)
Applying a suitable approximate-simulation technique of an epidemic model with random parameters
...Show More Authors

Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat

... Show More
Publication Date
Thu Dec 12 2013
Journal Name
Iraqi Journal Of Science
Determination of Optimum Mechanical Drilling Parameters for an Iraqi Field with Regression Model
...Show More Authors

Preview PDF
Publication Date
Thu Oct 27 2022
Journal Name
Molecules
An insight into geometries and catalytic applications of CeO2 from a DFT outlook
...Show More Authors

Rare earth metal oxides (REMOs) have gained considerable attention in recent years owing to their distinctive properties and potential applications in electronic devices and catalysts. Particularly, cerium dioxide (CeO2), also known as ceria, has emerged as an interesting material in a wide variety of industrial, technological, and medical applications. Ceria can be synthesized with various morphologies, including rods, cubes, wires, tubes, and spheres. This comprehensive review offers valuable perceptions into the crystal structure, fundamental properties, and reaction mechanisms that govern the well-established surface-assisted reactions over ceria. The activity, selectivity, and stability of ceria, either as a stand-alone catalyst or as

... Show More
Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an Autonomous Mobile Robot using Enhanced Bacterial Foraging Optimization Algorithm
...Show More Authors

This paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori

... Show More
View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Tue May 21 2019
Journal Name
The Journal Of Engineering
Performance of a tubular machine driven by an external‐combustion free‐piston engine
...Show More Authors

Crossref (2)
Clarivate Crossref
Publication Date
Sat Jan 09 2021
Journal Name
Journal Of Control, Automation And Electrical Systems
Design of an Adaptive Linear Quadratic Regulator for a Twin Rotor Aerodynamic System
...Show More Authors

View Publication
Scopus (6)
Crossref (8)
Scopus Clarivate Crossref