Background: Orthodontic therapy often causes external root resorption. Serum vitamin D (VD) level is important for tooth mineralization and bone remodeling. This study aimed to test the impact of vitamin D (VD) supplements on bone and root remodelling in a vitamin D (VD) deficient rat model following orthodontic retention. Methods and Material: 30 male Wistar rats were divided into three groups: a control group of 10 rats and two experimental groups of 10 rats each with vitamin D deficiency (VDD) induced by a VD-free diet for 21 days. And a third group with VD supplementAll groups received orthodontic active treatment using a modified orthodontic appliance that applied 50 gm of force for 14 days to move the maxillary right first molar mesially, followed by 7 days of retention and relapse. The VDD group received no intervention, while the VDS group received 40,000 IU/kg of systemic VD3 by intramuscular injection on the first and fifteenth day of orthodontic treatment. Histomorphometric analysis was performed to assess bone and cementum resorption and deposition. Results: The VDD group exhibited a significant increase in bone and root resorption and a decrease in bone deposition and ce-mentum deposition ratio. In addition, bone deposition and the ratio of cementum deposition were substantially greater in the VDS group compared to the control group. Conclusion: VDD may increase bone and root cementum resorption and decrease deposition after orthodontic retention, which may play a significant role in relapse after retention. Prior to beginning orthodontic treatment, routine VD screening may be beneficial.
In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox
... Show MoreVariable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage
... Show MoreLet A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.
Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F
... Show MoreOperated Alandziahih "drift theory" as a science talk in most of the cash and technical studies in the early twentieth century, making him and the sciences, arts and culture both fields of experiences, in an attempt to explore the institutions that theory, a number of laws which took control in the internal structures of those acts, resulting in for those institutions to be actively contribute their ideas to guide the pace on the right track. And thus lay the foundations of this theory, which was a big affair in the early twentieth century and still vigorous pace to this day, particularly their applications in various fields of the arts.Although each type of Arts, both in the composition or the theater or means of communication, took joi
... Show MoreThe effect of multiple scattering on the detected γ-photons at the surface of Hyakutake comet, which emitted from the radioisotope 137Cs were studied and compared the results with the single scattering case. Also the multiple scattering results were gathered with the single scattering case and investigate the effect. The calculations were conducted to analyze the variation of counts rate with source detector separation and the source of energy. Monte Carlo (MC) method was used to simulate the scattering and absorption of photons in semi-infinite material by developing the program in FORTRAN language (77 - 90) for this purpose. The distance between the source and the detector takes values of 1, 2,….5 cm, the results showed that single
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreABSTRACT Pulmonary alveolar microlithiasis is rare infiltrative pulmonary disease characterized by intra-alveoli deposition of microliths. We present a familial case of an adult female with complaint of progressive shortness of breath on exertion. Chest radiograph showed innumerable tiny dense nodules, diffusely involving both lungs mainly the lower zones. High-resolution CT scan illustrated widespread intra-alveolar microliths, diffuse ground-glass attenuation areas and septal thickening predominantly in the basal regions. Chest radiograph is all that is needed for the diagnosis of this case but CT scan was done to demonstrate the extent and severity of this disease
Synthetic polymers such as polyurethane are used widely in the field of biomedical applications such as implants or part of implant systems.
This paper focuses on the preparation of base polymer matrix composite materials by (Hand Lay-Up) method, and studying the effect of selected grain size (32, 53, 63, 75, and 90) µm of (Reenia) particles on some properties of the prepared composite.
Mechanical tests were used to evaluate the prepared system (Tensile, Compression, Impact, and Hardness) tests, and a physical test of (Water absorption %), and all tests were accomplished at room temperature.
Where results showed tensile test (maximum tensile strength and modulus of elasticity) high at small grain size while
... Show More