Background: Because of the demands for aesthetic orthodontic appliances have increased, aesthetic archwires have been widely used to meet patient's aesthetic needs. The color stability of aesthetic archwires is clinically important, any staining or discoloration will affect patient’s acceptance and satisfaction. This study was designed to evaluate the color stability of different types of aesthetic archwires after immersion into different types of mouth washes. Materials and methods: Four brands of nickel titanium coated aesthetic arch wires: Epoxy coated (Orthotechnology and G&H) and Teflon coated (Dany and Hubit) were evaluated after 1 week, 3 weeks and 6 weeks of immersion into two types of mouthwashes (Listerine with alcohol and Listerine without alcohol). Color change measurements were performed by using spectrophotometer VITA Easyshade Compact according to the commission Internationale de I’Eclairage L*a*b* color space system. Results: The results of this study showed that there were highly significant differences in color change values among all brands of aesthetic archwires at various immersion media. On the other hand, a significant difference was found between Dany and Orthotechnology aesthetic archwires at 1 week immersion in distilled water. Listerine with alcohol mouthwash produced more color changes of aesthetic archwires and color change value increases with the time of immersion. Conclusions: All brands of aesthetic archwires showed different degrees of color changes but most of these changes were not visible or clinically acceptable.
One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MorePlagiarism Detection Systems play an important role in revealing instances of a plagiarism act, especially in the educational sector with scientific documents and papers. The idea of plagiarism is that when any content is copied without permission or citation from the author. To detect such activities, it is necessary to have extensive information about plagiarism forms and classes. Thanks to the developed tools and methods it is possible to reveal many types of plagiarism. The development of the Information and Communication Technologies (ICT) and the availability of the online scientific documents lead to the ease of access to these documents. With the availability of many software text editors, plagiarism detections becomes a critical
... Show MoreBackground: Accurate detection of thyroid autoantibodies by enzyme linked immunosorbant assay technique namely thyroglobulin antibody, thyroid peroxides antibody is crucial in the differentiation of autoimmune thyroid disorders from other form of thyroid diseases.
Objective: Evaluation of the detection of thyroglobulin antibody and thyroid peroxides antibody in different thyroid diseases using enzyme linked immunosorbant assay technique.
Methods: - Seventy-five patients admitted to Surgical Units of Baghdad Medical City Hospital for the period between "October 2010 to June 2011" they were waiting to do thyroidectomy. They were chosen nonselectively for serological evaluation of above autoantibodies , and correlation of the results
Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreIn this paper, we study some cases of a common fixed point theorem for classes of firmly nonexpansive and generalized nonexpansive maps. In addition, we establish that the Picard-Mann iteration is faster than Noor iteration and we used Noor iteration to find the solution of delay differential equation.
The prediction of the blood flow through an axisymmetric arterial stenosis is one of the most important aspects to be considered during the Atherosclrosis. Since the blood is specified as a non-Newtonian flow, therefore the effect of fluid types and effect of rheological properties of non-Newtonian fluid on the degree of stenosis have been studied. The motion equations are written in vorticity-stream function formulation and solved numerically. A comparison is made between a Newtonian and non-Newtonian fluid for blood flow at different velocities, viscosity and Reynolds number were solved also. It is found that the properties of blood must be at a certain range to preventing atheroscirasis
An optimization analysis of drilling process constitutes a powerful tool for operating under desired pressure levels and simultaneously maximizing the penetration rate, which reduces costs and time thus increases the profit.
In this study, a composite drilling model (Young-Bourgyen model) of eight functions was used to determine the optimum drilling mechanical parameters (Weight on bit and rotary speed) for an Iraqi oil field. These functions model the effect of most drilling parameters such as formation strength, mud density, formation compaction, weight on bit, rotary speed, tooth dullness, and bit hydraulic on drilling rate. Data are extracted from bit record and drilling report of well BUZ-20 for calculation of eight exponents of