Background: Because of the demands for aesthetic orthodontic appliances have increased, aesthetic archwires have been widely used to meet patient's aesthetic needs. The color stability of aesthetic archwires is clinically important, any staining or discoloration will affect patient’s acceptance and satisfaction. This study was designed to evaluate the color stability of different types of aesthetic archwires after immersion into different types of mouth washes. Materials and methods: Four brands of nickel titanium coated aesthetic arch wires: Epoxy coated (Orthotechnology and G&H) and Teflon coated (Dany and Hubit) were evaluated after 1 week, 3 weeks and 6 weeks of immersion into two types of mouthwashes (Listerine with alcohol and Listerine without alcohol). Color change measurements were performed by using spectrophotometer VITA Easyshade Compact according to the commission Internationale de I’Eclairage L*a*b* color space system. Results: The results of this study showed that there were highly significant differences in color change values among all brands of aesthetic archwires at various immersion media. On the other hand, a significant difference was found between Dany and Orthotechnology aesthetic archwires at 1 week immersion in distilled water. Listerine with alcohol mouthwash produced more color changes of aesthetic archwires and color change value increases with the time of immersion. Conclusions: All brands of aesthetic archwires showed different degrees of color changes but most of these changes were not visible or clinically acceptable.
Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreScheduling Timetables for courses in the big departments in the universities is a very hard problem and is often be solved by many previous works although results are partially optimal. This work implements the principle of an evolutionary algorithm by using genetic theories to solve the timetabling problem to get a random and full optimal timetable with the ability to generate a multi-solution timetable for each stage in the collage. The major idea is to generate course timetables automatically while discovering the area of constraints to get an optimal and flexible schedule with no redundancy through the change of a viable course timetable. The main contribution in this work is indicated by increasing the flexibility of generating opti
... Show MoreHerein, an efficient inorganic/organic hybrid photocatalyst composed of zeolitic imidazolate framework (ZIF-67) decorated with Cd0.5Zn0.5S solid solution semiconductor was constructed. The properties of prepared ZIF- [email protected] nanocomposite and its components (ZIF-67 and Cd0.5Zn0.5S) were investigated using XRD, FESEM, EDX, TEM, DRS and BET methods. The photocatalytic activity of fabricated [email protected] nanocomposite were measured toward removal of methyl violet (MV) dye as a simulated organic contaminant. Under visible-light and specific conditions (photocatalyst dose 1 g/l, MV dye 10 mg/l, unmodified solution pH 6.7 and reaction time 60 min.), the acquired [email protected] photocatalyst showed advanced photocatalytic activity
... Show MoreIn this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Environmental education is considered as process of getting Humans in communication with this environment and all its various resources. such process requires acquiring knowledge about the environment that com help humans understand their correlative relations with the environmental elements on one hand and among the environmental elements themselves on the other . Besides, such a process requires developing human skills that help them participate in developing environmental circumstances. Therefore environmental education is responsible for perspective and cultural development that governs human behavior. Regarding their environment and stimulating tendencies and interests towards the environment , let alone helping humans acquire the c
... Show MoreUncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image
... Show More