Background: Because of the demands for aesthetic orthodontic appliances have increased, aesthetic archwires have been widely used to meet patient's aesthetic needs. The color stability of aesthetic archwires is clinically important, any staining or discoloration will affect patient’s acceptance and satisfaction. This study was designed to evaluate the color stability of different types of aesthetic archwires after immersion into different types of mouth washes. Materials and methods: Four brands of nickel titanium coated aesthetic arch wires: Epoxy coated (Orthotechnology and G&H) and Teflon coated (Dany and Hubit) were evaluated after 1 week, 3 weeks and 6 weeks of immersion into two types of mouthwashes (Listerine with alcohol and Listerine without alcohol). Color change measurements were performed by using spectrophotometer VITA Easyshade Compact according to the commission Internationale de I’Eclairage L*a*b* color space system. Results: The results of this study showed that there were highly significant differences in color change values among all brands of aesthetic archwires at various immersion media. On the other hand, a significant difference was found between Dany and Orthotechnology aesthetic archwires at 1 week immersion in distilled water. Listerine with alcohol mouthwash produced more color changes of aesthetic archwires and color change value increases with the time of immersion. Conclusions: All brands of aesthetic archwires showed different degrees of color changes but most of these changes were not visible or clinically acceptable.
The Contemporary Business Environment is Surrounded by many quick and continues variable and changes which has an effect on the economic units. These variables and changes like the high competition which need many tools to help them to continue and achieve The critical success. So to achieve this they have many competitive strategies like cost leadership strategy, differentiation strategy and focus strategy.
Budget is regarded one of main tools to execute objectives polices and programs of the economic units, beside show how the economic units had execute the available economic resources.
Activity based on budgeting is regarded one of the modern technique in the m
... Show MoreCurrent research aims to find out:
- Effect of using the active learning in the achievement of third grade intermediate students in mathematics.
- Effect of using of active learning in the tendency towards the study of mathematics for students of third grade intermediate.
In order to achieve the goals of the research, the researcher formulated the following two hypotheses null:
- There is no difference statistically significant at the level of significance (0.05) between two average of degrees to achievement
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreImage databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
The convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog
... Show MoreThe COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show More