Background: Reduction in bond strength when bonding was done immediately after intracoronal bleaching procedure has been recognized. The purpose of this study is to assess the effect of antioxidants (10% sodium ascorbate (SA), 0.1M thiourea and7% sodium bicarbonate (SB)) on reversing bonding strength of composite resin to bleached dentin. Materials and method: Sixty upper 1st premolar teeth, were selected, the crowns of the teeth were embedded in acrylic resin blocks exposing a flat dentin from the buccal surface, then divided into 6 groups (10 samples each). Bleaching for the experimental groups was performed using 35% hydrogen peroxide bleaching gel (pola–office).Group A (Negative control group; dentin samples immediately bonded with composite without bleaching)Group B (Positive control group; dentin samples bleached and immediately bonded with composite). Group C (Dentin samples bleached and stored for 14 days in DDW then bonded with composite). Group D (Dentin samples bleached and treated with 10% (SA) then immediately bonded with composite). Group E (Dentin samples bleached and treated with 0.1M thiourea then immediately bonded with composite). Group F (Dentin samples bleached and treated with 7% SB then immediately bonded with composite).The shear bond strength was determine using instron testing machine. Results: Bleaching the dentin with 35 % hydrogen peroxide gel for 24 minutes resulted in reduction in bond strength of the bleached teeth when bonding was performed immediately after bleaching. Delayed bonding of composite to the bleached dentin for 14 days will result in a highly significant increase in the shear bond strength. Conclusion: Treating the bleached dentin with 10% (SA) in water base showed a highly significant increase in the shear bond strength of the composite to dentin and reversing the bond strength value to the level of the unbleached dentin. Treating the bleached dentin with 0.1M thiourea significantly increased the shear bond strength of the composite to dentin.
The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show MoreAbstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
The current study aims at using non-hatchable artemia eggs of local origin and making use of these eggs by decapsulating and presenting them as food for the larvae of the Cyprinus carpio as a source of animal protein with high nutritional value instead of throwing them away. The results showed that the second parameter (A2) was highly significant at the level (P≤0.05) in the growth rates of the larvae that were fed on decapsulated artemia eggs alone, and it was better than the two control parameters (A1), in which the larvae were fed with feed designated for Cyprinus carpio fish. It also outperformed the third parameter (A3), in which the feed was mixed with artemia eggs with 50% decapsulation, which also outperformed the control paramete
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThe concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat
... Show More