Preferred Language
Articles
/
jbcd-2221
Color Stability of Different Aesthetic Archwires after Immersion into Different Types of Mouthwashes(An In Vitro Study)
...Show More Authors

Background: Because of the demands for aesthetic orthodontic appliances have increased, aesthetic archwires have been widely used to meet patient's aesthetic needs. The color stability of aesthetic archwires is clinically important, any staining or discoloration will affect patient’s acceptance and satisfaction. This study was designed to evaluate the color stability of different types of aesthetic archwires after immersion into different types of mouth washes. Materials and methods: Four brands of nickel titanium coated aesthetic arch wires: Epoxy coated (Orthotechnology and G&H) and Teflon coated (Dany and Hubit) were evaluated after 1 week, 3 weeks and 6 weeks of immersion into two types of mouthwashes (Listerine with alcohol and Listerine without alcohol). Color change measurements were performed by using spectrophotometer VITA Easyshade Compact according to the commission Internationale de I’Eclairage L*a*b* color space system. Results: The results of this study showed that there were highly significant differences in color change values among all brands of aesthetic archwires at various immersion media. On the other hand, a significant difference was found between Dany and Orthotechnology aesthetic archwires at 1 week immersion in distilled water. Listerine with alcohol mouthwash produced more color changes of aesthetic archwires and color change value increases with the time of immersion. Conclusions: All brands of aesthetic archwires showed different degrees of color changes but most of these changes were not visible or clinically acceptable.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Impact of budget on the basis of activities in the implementation of competitive strategiesApplied Study in the General Company for Electrical Industries - Tammuz Laboratory
...Show More Authors

The Contemporary Business Environment is Surrounded by many quick and continues variable and changes which has an effect on the economic units. These variables and changes like the high competition which need many tools to help them to continue and achieve The critical success. So to achieve this they have many competitive strategies like cost leadership strategy, differentiation strategy and focus strategy.

Budget is regarded one of main tools to execute objectives polices and programs of the economic units, beside show how the economic units had execute the available economic resources.

Activity based on budgeting is regarded one of the modern technique in the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 03 2011
Journal Name
Journal Of Educational And Psychological Researches
Effect of using the active learning in the achievement of third grade intermediate students in mathematics and them tendency towards the study of its
...Show More Authors

Current research aims to find out:

  1. Effect of using the active learning in the achievement of third grade intermediate students in mathematics.
  2. Effect of using of active learning in the tendency towards the study of mathematics for students of third grade intermediate.

In order to achieve the goals of the research, the researcher formulated the following two hypotheses null:

  1. There is no difference statistically significant at the level of significance (0.05) between two average of degrees to achievement

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
An optimized deep learning model for optical character recognition applications
...Show More Authors

The convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Sun Mar 26 2023
Journal Name
Wasit Journal Of Pure Sciences
Covid-19 Prediction using Machine Learning Methods: An Article Review
...Show More Authors

The COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jul 12 2025
Journal Name
International Journal Of Engineering &amp; Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2008
Journal Name
Lecture Notes In Computer Science
IRPS – An Efficient Test Data Generation Strategy for Pairwise Testing
...Show More Authors

View Publication
Scopus (20)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Results In Physics
An efficient iterative method for solving the Fokker–Planck equation
...Show More Authors

View Publication
Crossref (8)
Crossref