Background: Denture cleansing was an important step that could prevent the spread of infection and improve a patient's health, the durability of the dentures, and the overall quality of life; therefore, it was necessary to choose a suitable cleanser that, in addition to being effective, did not have an unfavorable effect on the qualities of the denture base resin itself when used for an extended period. For this purpose, this study aimed to evaluate the effect of tea tree oil (TTO) on Candida albicans adhesion and the surface roughness property of poly(methyl methacrylate) denture material after immersion in TTO. Methods: A total of 55 heat-cured acrylic resin specimens were used for C. albicans adherence and surface roughness tests. They were distributed into groups (0.25%, 0.5%, 0.75%, and 1%) of TTO, distilled water (DW), and 2% clorhexidine digluconate, totaling five specimens for each group. The specimens were immersed in accordance with their group for 10 minutes. Surface roughness was determined by a profilometer, and C. albicans adherence was determined by measuring optical density with a spectrophotometer. For comparisons between groups for surface roughness and disinfection tests, one-way ANOVA was performed on SPSS program, considering α = 0.05. Results: TTO had a statistically significant effect on C. albicans adhesion to heat-cured acrylic resin (P < 0.05) compared with negative control. Meanwhile, no statistically significant difference was found between 0.75% and 1% TTO concentrations (P > 0.05), whereas the surface roughness test showed a statistically non-significant difference between TTO concentrations and DW (P > 0.05). Conclusions: Immersion of acrylic resin in TTO was effective in decreasing C. albicans adhesion to it, and the greatest decrease was obtained by 1% TTO. The surface roughness test showed a non-significant difference in acrylic roughness after immersion in TTO.
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreSustainable vegetative management plays a significant role in improving soil quality in degraded agricultural landscapes by enhancing soil microbial biomass. This study investigated the effects of grass buffers (GBs), biomass crops (BCs), grass waterways (GWWs), and agroforestry buffers (ABs) on soil microbial biomass and soil organic C (SOC) compared with continuous corn (
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreThe risk of significant concern is resistance to antibiotics for public health. The alternative treatment of metallic nanoparticles (NPs), such as heavy metals, effects on antibiotic resistance bacteria with different types of antibiotics of - impossible to treat using noval eco-friendly synthesis technique nanoparticles copper oxide (CuO NPs) preparation from S. epidermidis showed remarkable antimicrobial activity against S.aureus Minimum inhibitory concentra range (16,32,64,256,512) µg/ml via well diffusion method in vitro, discover those concentrations effected in those bacteria and the best concentration is 64 µg/ml, characterization CuO NPs to prove this included atomic force microscope, UV, X-ray Diffraction and TEM, and ant
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show More