Preferred Language
Articles
/
pRf7LZIBVTCNdQwC96fn
Poly-ether-ether-ketone (PEEK) versus dead-soft coaxial bonded retainers: a randomized clinical trial. Part 1. Stability, retainer failure, and participant satisfaction
...Show More Authors
Abstract<sec> <title>Background

Poly-ether-ether-ketone (PEEK) was introduced in dentistry as an alternative to metal alloys.

Objective

To assess the effectiveness of PEEK-fixed retainers in preserving the stability of mandibular anterior and participant satisfaction as compared to the Dead-soft coaxial fixed retainer (DSC).

Trial design

A single-centre, two-arm parallel groups randomized clinical trial.

Methods

The patients treated with pre-adjusted orthodontic appliances who have a Little’s Irregularity Index (LII) ≤ 0.5 mm have been enrolled in the trial. PEEK retainers were prepared to round 0.8 mm wire by computer-aided design and manufacturing, and the DSC wire was carefully adapted to the lingual surface of the lower anterior teeth. The primary outcome was the stability of lower anterior teeth as assessed by LII, while the secondary outcomes were changes in occlusal parameters, retainer failure, and patient satisfaction. The data were collected at the debonding stage (T0), 1 month (T1), 3 months (T3), and 6 months (T6) after starting the trial, except for patient’s satisfaction, which was recorded using an electronic form at T1 and T6.

Blinding

Single blinding of participants.

Results

A total of 46 participants with an age range of 12–28 years old were randomly allocated to the two groups (n = 23 in each). Only one participant dropped out; therefore, 45 participants were analysed. The DSC group showed a significant increase in LII at T3. Both retainer groups had comparable occlusal measurements, failure frequency, and survival time, with no significant difference. The patients in the DSC group reported a statistically significant perception of change in the position of their teeth compared to those in the PEEK group.

Harms

No harmful effects have been reported.

Limitations

Limited follow-up duration and the inability to blind the operator due to the nature of the intervention.

Conclusions

After 6-month retention, the PEEK retainer was equally effective to DSC retainers in maintaining the teeth alignment, with no significant differences regarding the failure frequency, survival rate, and general patient satisfaction.

Trial registration

https://register.clinicaltrials.gov. (NCT05557136).

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
The Middle East and Contemporary Geostrategic Shifts: A Geopolitical Study
...Show More Authors

This research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Middle East and its Strategic Dimensions: a theoretical study
...Show More Authors

Characterized the Middle East has geographic, economic, and geostrategic peculiarities, but it suffers from many problems, such as disagreement over what it means as a concept, or what it represents of a geographic extension. The question is related to the ambiguity surrounding the concept of the Middle East? The purpose of its launch? As it relates to its geostrategic, economic, and geo-cultural importance? And manifestations of this importance? And to what extent he retained his value in the strategies of the major powers? Research hypotheses:

-The multiplicity of concepts for the Middle East region, with international political and Geostrategic interests.- The geostrategic value of the Middle East has made it a focal point for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Strategic Entrepreneur ship and its role in a marketing performance
...Show More Authors

The current research aims through its chapters to verify the relationship and impact of strategic leadership as an independent variable in the marketing performance as a respondent variable, in a leap cement plant, and try to come up with a set of recommendations that contribute to enhancing the practice and adoption of the two variables in the organization under discussion. And based on the importance of the research topic to the community, and to the researched organization and its members, the analytical and analytical approach was adopted in the completion of this research, and the research community included a leap cement plant in Anbar Governorate, while the research sample was represented by (department heads, and people o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Oct 23 2020
Journal Name
Biomed Research International
A Computational Model of the Brain Cortex and Its Synchronization
...Show More Authors

Obtaining the computational models for the functioning of the brain gives us a chance to understand the brain functionality thoroughly. This would help the development of better treatments for neurological illnesses and disorders. We created a cortical model using Python language using the Brian simulator. The Brian simulator is specialized in simulating the neuronal connections and synaptic interconnections. The dynamic connection model has multiple parameters in order to ensure an accurate simulation (Bowman, 2016). We concentrated on the connection weights and studied their effect on the interactivity and connectivity of the cortical neurons in the same cortical layer and across multiple layers. As synchronization helps us to mea

... Show More
View Publication
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Epitoanyag - Journal Of Silicate Based And Composite Materials
Flame retardants, their beginning, types, and environmental impact: a review
...Show More Authors

The current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Aug 02 2022
Journal Name
Journal Of Population Therapeutics & Clinical Pharmacology
A systematic review of Antimicrobial peptides and their current applications
...Show More Authors

In present days, drug resistance is a major emerging problem in the healthcare sector. Novel antibiotics are in considerable need because present effective treatments have repeatedly failed. Antimicrobial peptides are the biologically active secondary metabolites produced by a variety of microorganisms like bacteria, fungi, and algae, which possess surface activity reduction activity along with this they are having antimicrobial, antifungal, and antioxidant antibiofilm activity. Antimicrobial peptides include a wide variety of bioactive compounds such as Bacteriocins, glycolipids, lipopeptides, polysaccharide-protein complexes, phospholipids, fatty acids, and neutral lipids. Bioactive peptides derived from various natural sources like bacte

... Show More
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
Educational Curricula of preeminent and Talent:Enrichment Curriculum as a Model
...Show More Authors

This research aimed at recognizing the properties of curricula that fitted to preeminent and talent students. Many types of these curricula were exposed, enrichment curriculum was explained as one of alternatives of available curricula.
The research used the analytical methodology for local and international literature in the field of preeminent and talent education to meet the properties of curricula that fitted to this special group of students. Many results was obtained as:
• This type of school enrichment curriculum consists of three levels( general discovery activities, individual and groups training activities, and individual or groups real problems).
• Investigation the effectively both sides of brain: right and left,

... Show More
View Publication Preview PDF