Background: This study was performed to determine the effect of aging of different types of composite material restorations on: Shear bond strength (SBS) to light cure and no mix chemical cure orthodontic adhesives with sapphire bracket and the debonding failure sites. Materials and methods: One hundred forty four composite disks were made from three different composite resin materials which are: 3M Filtek Z250, 3M filtek Z350 and 3M Valux plus, each group with (48) disks each, then according to the duration of storage each group was subdivided into two equal groups one of them stored for one day and the other was stored for one month, then each group was further subdivided into two equal subgroups with (12) disks each one bonded with light cure orthodontic adhesive and the other with no mix chemical cure adhesive. The sample was tested for bond strength using the universal testing machine and the Adhesive Remnant Index (ARI) was inspected under the stereomicroscope. Results: The results revealed that there was a highly significant difference among the three types of composite materials bonded with light cure orthodontic adhesive as showed by ANOVA test, while the T test showed that there was no significant difference between the two storage durations and also between the two orthodontic adhesives for both Filtek Z250 and Valux plus. Conclusions: The highest (SBS) values were obtained from Filtek Z350 samples than other two types of composite. All the samples stored for one day showed higher values of (SBS) than those stored for one month.
This study aimed at isolating uropathogenic Escherichia coli from urinary tract infections (UTIs) of human and cattle to examine the molecular diversity and phylogenetic relationship of the isolates. A total of 100 urine samples were collected from UTIs of human and cattle. The isolates identification was done using routine diagnostic methods and confirmed by Vitek2. Antimicrobial susceptibility was tested against 10 antimicrobials. Random amplified polymorphic DNA (RAPD)-polymerase chain reaction (PCR) was applied to identify the genetic diversity among E. coli isolates from human and animal origin by using five different octamer primers. The gelJ software for the phylogenetic analysis created Dendrograms. Out of 50 human urine samples, E.
... Show MoreHeterocyclic compounds are crucial for medicinal chemistry and the development of therapeutic agents like broad-spectrum antibiotics. This study devised a facile procedure to synthesize novel antimicrobial bicyclic heterocycles from 2-mercapto-3-phenylquinazolin-4(3H)-one. Advanced analytical techniques including 1 H and 13C NMR, elemental analysis, and FT-IR spectroscopy characterized the intricate chemical structures of the products. In vitro assays tested the heterocycles against aerobic and anaerobic bacterial strains using fluconazole and ciprofloxacin as antifungal and antibacterial controls. Results demonstrated the formidable broad-spectrum antibacterial and antifungal activities of the synthesized compounds, with growth inhibition
... Show MoreAbstract
Objective: the idea of this study to improve transdermal permeability of Methotrexate using eucalyptus oil, olive oil and peppermint oil as enhancers.
Method: eucalyptus oil (2% and 4%), peppermint oil (2% and 4%) and olive oil (2% and 4%) all used as natural enhancers to develop transdermal permeability of Methotrexate via gel formulation. The gel was subjected to many physiochemical properties tests. In-vitro release and permeability studies for the drug were done by Franz cell diffusion across synthetic membrane, kinetic model was studied via korsmeyer- peppas equation.
Result: the results demonstrate that safe, nonirritant or cause necrosis to rats' skin and stable till 60 days gel was successfully formulated.<
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreSGI2 wild type isolate of Sinorhizobium meliloti was isolated from Medicago sativa (alfalfa) plant which was obtained from Al-Tarmiaa region / Baghdad. Nine auxotrophic mutants were obtained from the SGI2 wild type isolate by mutagenesis with Nitrous acid (HNO2). The SGI2 wild type and the all auxotrophic mutant isolates had two Megaplasmids; pSymA and pSymB. No genetic variations in plasmid number and size were detected when gel electrophoresis was done for plasmid profile detection. Genetic variations by using RAPD-PCR technique were obtained between wild type and auxotrophic mutant isolates. One band was detected in SGI6 gel profile with 1.5 Kb size when OPY-04 primer was used. Using OPB7 primer by using RAPD-PCR technique showed larg
... Show MoreIn present work an investigation for precise hole drilling via continuous wave (CW) CO2 laser at 150 W maximum output power and wavelength 10.6 μm was achieved with the assistance of computerized numerical controlled (CNC) machine and assist gases. The drilling process was done for thin sheets (0.1 – 0.3 mm) of two types of metals; stainless steel (sst) 321H, steel 33 (st). Changing light and process parameters such as laser power, exposure time and gas pressure was important for getting the optimum results. The obtained results were supported with computational results using the COMSOL 3.5a software code.
The linear non-polynomial spline is used here to solve the fractional partial differential equation (FPDE). The fractional derivatives are described in the Caputo sense. The tensor products are given for extending the one-dimensional linear non-polynomial spline to a two-dimensional spline to solve the heat equation. In this paper, the convergence theorem of the method used to the exact solution is proved and the numerical examples show the validity of the method. All computations are implemented by Mathcad15.