Preferred Language
Articles
/
jbcd-532
The effects of various beverages on the shear bond strength of light-cured orthodontic composite (An in vitro comparative study)

Background: This study was conducted to assess the effects of various beverages on the shear bond strength of light-cured orthodontic composite used to bond stainless steel orthodontic brackets on human teeth and to determine the site of bonding failure of this material. Materials and Methods: Fifty extracted human premolars were selected and randomly divided into five equal groups each with 10 teeth according to the beverage type (Control, One Tiger, Milk, Green tea and Coffee). After bonding, the teeth were immersed in specific beverages for 5 minutes twice daily with equal intervening intervals then washed and stored in distilled water at 37º C for the reminder of the day. The process was carried out for 30 days. The samples were then tested for shear bond strength using Tinius-Olsen testing machine with a crosshead speed of 0.5mm/minute. For adhesive remnant index, the enamel surface and bracket base of each tooth were inspected under magnifying lens (20X) of a stereomicroscope. Results: Milk, coffee and one Tiger energy drink reduced the shear bond strength of the light-cured composite significantly unlike the green tea. The predominant site of bond failure was between the bracket base and the adhesive leaving the composite on the tooth rather on the brackets base. Conclusions: Orthodontic patients should be instructed to reduce the intake of acidic and fatty beverages to prevent debonding of the orthodontic brackets.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Jan 09 2021
Journal Name
Journal Of Control, Automation And Electrical Systems
Scopus (4)
Crossref (6)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an Autonomous Mobile Robot using Enhanced Bacterial Foraging Optimization Algorithm

This paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori

... Show More
Crossref (13)
Crossref
View Publication Preview PDF
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Strongly Convergence of Two Iterations For a Common Fixed Point with an Application

     In this paper, we study some cases of a common fixed point theorem for classes of firmly nonexpansive and generalized nonexpansive maps. In addition, we establish that the Picard-Mann iteration is faster than Noor iteration and we used Noor iteration to find the solution of delay differential equation.

 

Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Identification of an unknown person using Y-chromosome markers and mitochondrial dna typing

Background: The present article is concerned within the scope of Forensic Medicine, specifically Forensic Genetics. The case was taken care of in the Genetic-Molecular Laboratory of the Odessa Regional Bureau of Forensic-Medical Examinations, in Ukraine, during January and February of 2014.
Objectives: The aim of our work was to identify an unknown person, using the techniques: Y-chromosome markers and mitochondrial DNA typing.
Materials and methods: The materials available for our procedure were: pieces of tissue in paraffin blocks, saved from the corpse of the unknown person; blood from a living male subject, who claimed to be the grandfather, and from two females, allegedly the sisters. From all of them we extracted nuclear DNA

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Determination of Optimum Mechanical Drilling Parameters for an Iraqi Field with Regression Model

An optimization analysis of drilling process constitutes a powerful tool for operating under desired pressure levels and simultaneously maximizing the penetration rate, which reduces costs and time thus increases the profit.
In this study, a composite drilling model (Young-Bourgyen model) of eight functions was used to determine the optimum drilling mechanical parameters (Weight on bit and rotary speed) for an Iraqi oil field. These functions model the effect of most drilling parameters such as formation strength, mud density, formation compaction, weight on bit, rotary speed, tooth dullness, and bit hydraulic on drilling rate. Data are extracted from bit record and drilling report of well BUZ-20 for calculation of eight exponents of

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
A Hyperbolic Potential Field Model for Designing an Einzel Lens of Low Aberrations

An analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi

... Show More
View Publication Preview PDF
Publication Date
Tue May 21 2019
Journal Name
The Journal Of Engineering
Crossref (2)
Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Histopathological changes of mice liver induced by an Aloe vera whole leaf extract

Plants commonly used in traditional medicine are assumed to be safe. This safety is based on their long usage in the treatment of diseases according to knowledge accumulated over centuries. One such plants is Aloe vera which has been used medicinally for centuries. Recent widespread importance of commercial Aloe vera has encouraged scientists to scientifically assess these products since it contains the anthraquinones which associated with considerable risks. In present study oral administration of 20 μl of Aloe vera extract (experimental group) (G) was given for 21 days to immature male Swiss Webster mice at weaning period. While the control groups (C) were given by the same dose and rout of administration with normal saline only. Afte

... Show More
View Publication Preview PDF