Background: One common undesirable side effect of orthodontic treatment with fixed appliances is the development of incipient caries lesions around brackets, particularly in patients with poor oral hygiene. Different methods have been used to prevent demineralization; the recent effort to improve the resistance against the demineralization is by the application of lasers. Materials and method: Thirty human premolars extracted for orthodontic purposes were used to test the effect of two energy level of ER-YAG laser on enamel resistance to demineralization. The brackets were bonded on the teeth and all the labial surface excluding 2 mm area gingival to the brackets were painted with acid resistance varnish. Three groups were generated. The first group was the control group (A), with no treatment was performed. In group II (B)and groups III (C); teeth were irradiated by ER-YAG laser of 200, 60 mj energy respectively. All the teeth were individually subjected to acid challenge cycle for 30 days. After debonding longitudinal sections were taken and examined under stereomicroscope. The enamel demineralization evaluation was done by taking the average of three depths at the centre of the artificial lesion. Also the enamel surface was classified by an experienced investigator according to acid etch pattern. Comparisons of the average depth values of the groups were performed with ANOVA and LSD tests. The statistical significance level was set at p ≤ 0.05. Results: The results revealed that average lesion depth was significantly deeper at the control group than the laser groups, and its significantly deeper in group (B) 200 mj than in group (C) 60 mj, enamel surfaces showed deeper pits and craters than in control group. Conclusions: the decrease in artificial caries lesion depth associated with use of the two laser energy level support the ER-YAG laser as a tool to increase enamel resistance to demineralization and white spot lesion prevention. Key words: Demineralization, ER-YAG, laser.
Background subtraction is the dominant approach in the domain of moving object detection. Lots of research has been done to design or improve background subtraction models. However, there are a few well-known and state-of-the-art models that can be applied as a benchmark. Generally, these models are applied to different dataset benchmarks. Most of the time, choosing an appropriate dataset is challenging due to the lack of dataset availability and the tedious process of creating ground-truth frames for the sake of quantitative evaluation. Therefore, in this article, we collected local video scenes of a street and river taken by a stationary camera, focusing on dynamic background challenges. We presented a new technique for creati
... Show MoreThe approach of green synthesis of bio-sorbent has become simple alternatives to chemical synths as they use for example plant extracts, plus green synthesis outperforms chemical methods because it is environmentally friendly besides has wide applications in environmental remediation. This paper investigates the removal of ciprofloxacin (CIP) using green tea nano zero-valent iron (GT-NZVI) in an aqueous solution. The synthesized GT-NZVI was categorized using SEM, AFM, BET, FTIR, and Zeta potentials techniques. The spherical nanoparticles were found to be nano zero-valent, with an average size of 85 nm and a surface area of 2.19m2/g. The results showed that the removal efficiency of ciprofloxacin depends on the initial pH (2.5-10),
... Show MoreThis study aimed at isolating uropathogenic Escherichia coli from urinary tract infections (UTIs) of human and cattle to examine the molecular diversity and phylogenetic relationship of the isolates. A total of 100 urine samples were collected from UTIs of human and cattle. The isolates identification was done using routine diagnostic methods and confirmed by Vitek2. Antimicrobial susceptibility was tested against 10 antimicrobials. Random amplified polymorphic DNA (RAPD)-polymerase chain reaction (PCR) was applied to identify the genetic diversity among E. coli isolates from human and animal origin by using five different octamer primers. The gelJ software for the phylogenetic analysis created Dendrograms. Out of 50 human urine samples, E.
... Show MoreHeterocyclic compounds are crucial for medicinal chemistry and the development of therapeutic agents like broad-spectrum antibiotics. This study devised a facile procedure to synthesize novel antimicrobial bicyclic heterocycles from 2-mercapto-3-phenylquinazolin-4(3H)-one. Advanced analytical techniques including 1 H and 13C NMR, elemental analysis, and FT-IR spectroscopy characterized the intricate chemical structures of the products. In vitro assays tested the heterocycles against aerobic and anaerobic bacterial strains using fluconazole and ciprofloxacin as antifungal and antibacterial controls. Results demonstrated the formidable broad-spectrum antibacterial and antifungal activities of the synthesized compounds, with growth inhibition
... Show MoreAbstract
Objective: the idea of this study to improve transdermal permeability of Methotrexate using eucalyptus oil, olive oil and peppermint oil as enhancers.
Method: eucalyptus oil (2% and 4%), peppermint oil (2% and 4%) and olive oil (2% and 4%) all used as natural enhancers to develop transdermal permeability of Methotrexate via gel formulation. The gel was subjected to many physiochemical properties tests. In-vitro release and permeability studies for the drug were done by Franz cell diffusion across synthetic membrane, kinetic model was studied via korsmeyer- peppas equation.
Result: the results demonstrate that safe, nonirritant or cause necrosis to rats' skin and stable till 60 days gel was successfully formulated.<
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More