Background: Lack of durability of the bond of the dental adhesive systems to tooth structure is one of the most important problems in tooth colored restorative work. This in vitro study was performed to evaluate the effect of 2% chlorhexidine gluconate(CHX) on dentin bond strength by using total etch adhesive system at twenty-four hours and three months of water storage. Material and methods:A flat dentin surface was prepared for forty sound human maxillary premolar teeth which were acid etched with 36% phosphoric acid gel after being divided randomly into four groups of ten teeth each according to storage time and CHX application, theCHX was applied for 60 seconds before adhesive application for groups I and III which were tested after twenty-four hours and three months respectively, while the distal water was applied for 60 seconds before the application of adhesive for group II and IV which were tested after twenty-four hours and three months respectively.The Prime and Bond® NT™ adhesive (Dentsply) was applied and cured, Composite (Ceram X mono, Dentisply) was applied through special mold with 2 mm thickness and light cured, Then all specimens were stored in distilled water 37oC until the time of testing of each group.Shear bond strength test was performed at the end of the storage period (24 hours or 3 months). Results:T-test results showed high statistically significant reduction in shear bond strength (SBS) in non CHX group IV (tested after 3 months) compared to non CHX group II (tested after 24 hours)(P< 0.01). In CHX groups I (tested after 24 hours) and III (tested after 3 months), results showed no statistically significant differences in shear bond strength(p> 0.05).On the other hand result showed statistically no significant differences between groups I and II in 24 hours shear bond strength (P> 0.05). After 3 months water storage, there was statistically high significant differences between the groups III and IV (P< 0.01). Conclusion: the use of 2 % CHX glocounate solution after acid etching and before bonding of dentin have no adverse effect on immediate bond strength (24 hours storage), and was effective in reducing degradation of resin-dentin bond interface after three months of water storage.
This paper discusses reliability of the stress-strength model. The reliability functions ð‘…1 and ð‘…2 were obtained for a component which has an independent strength and is exposed to two and three stresses, respectively. We used the generalized inverted Kumaraswamy distribution GIKD with unknown shape parameter as well as known shape and scale parameters. The parameters were estimated from the stress- strength models, while the reliabilities ð‘…1, ð‘…2 were estimated by three methods, namely the Maximum Likelihood, Least Square, and Regression.
A numerical simulation study a comparison between the three estimators by mean square error is performed. It is found that best estimator between
... Show MoreAlthough its wide utilization in microbial cultures, the one factor-at-a-time method, failed to find the true optimum, this is due to the interaction between optimized parameters which is not taken into account. Therefore, in order to find the true optimum conditions, it is necessary to repeat the one factor-at-a-time method in many sequential experimental runs, which is extremely time-consuming and expensive for many variables. This work is an attempt to enhance bioactive yellow pigment production by Streptomyces thinghirensis based on a statistical design. The yellow pigment demonstrated inhibitory effects against Escherichia coli and Staphylococcus aureus and was characterized by UV-vis spectroscopy which showed lambda maximum of
... Show MoreIn this research, the focus was on estimating the parameters on (min- Gumbel distribution), using the maximum likelihood method and the Bayes method. The genetic algorithmmethod was employed in estimating the parameters of the maximum likelihood method as well as the Bayes method. The comparison was made using the mean error squares (MSE), where the best estimator is the one who has the least mean squared error. It was noted that the best estimator was (BLG_GE).
Deposits with the Industrial Bank, together with loans received from others, are non-financial financial resources, which are sources of supply to the Industrial Bank of funds that allow the Bank to expand the granting of loans. The increases in this resource indicates that the bank is practicing comprehensive banking, which is consistent with the nature of the transformation of the banking system towards multiple businesses. Therefore, the research comes to highlight the causality of the trend between total deposits and total loans. And if the causality is found, is it one-way or two-way? How long is the impact?
Background: Failure of resin bases were a major disadvantage recorded in the constructed dentures. Reinforcements of the repair joint with nano fillers represent an attempt to enhance the strength and durability. The purpose of the research was to estimate the influence of nano fillers reinforcement with (ZrO2 and Al2O3) on impact and transverse strength of denture bases repaired with either cold or hot processing acrylic resin. Materials and methods: A hundred and forty (140) samples were processed with hot cured resin and organized in subgroups depending on the repair materials and condition (without repair (control), repair with hot cure, cold cure, hot and cold cure reinforced with either (5% Zr2O or 0.5% Al2O3). The samples in these
... Show MoreThe In this experimental study, natural stone powder was utilized to improve a cohesive soil’s compaction and strength properties. According to the significant availability of limestone in the globe, it has been chosen for the purpose of the study, in addition to considering the existing rock industry massive waste. Stone powder was used in percentages of 4, 8, 12, 16% replaced from the soil weight in dry state. Some of cohesive soil’s consistency, shear, and compaction properties were depicted after improvement. The outcomes yielded in significant amendments in the experimented geotechnical properties after stone powder addition considering 60 days curing period. Cohesion and friction angle were notably increased by
... Show MoreA complete metric space is a well-known concept. Kreyszig shows that every non-complete metric space can be developed into a complete metric space , referred to as completion of .
We use the b-Cauchy sequence to form which “is the set of all b-Cauchy sequences equivalence classes”. After that, we prove to be a 2-normed space. Then, we construct an isometric by defining the function from to ; thus and are isometric, where is the subset of composed of the equivalence classes that contains constant b-Cauchy sequences. Finally, we prove that is dense in , is complete and the uniqueness of is up to isometrics
Image classification can be defined as one of the most important tasks in the area of machine learning. Recently, deep neural networks, especially deep convolution networks, have participated greatly in end-to-end learning which reduce need for human designed features in the image recognition like Convolution Neural Network. It is offers the computation models which are made up of several processing layers for learning data representations with several abstraction levels. In this work, a pre-trained deep CNN is utilized according to some parameters like filter size, no of convolution, pooling, fully connected and type of activation function which includes 300 images for training and predict 100 image gender using probability measures. Re
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More