Background: Elastomeric chains are used to generate force in many orthodontic procedures, but this force decays over time, which could affect tooth movement. This study aimed to study the force degradation of elastomeric chains. Data and Sources: An electronic search on Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, LILACS, and PubMed was made, only articles written in English were included, up to January 2022.Study selection: Fifty original articles, systematic reviews, and RCTs were selected. Conclusion: Tooth movement, salivary enzymes, alcohol-containing mouthwash, whitening mouthwash, and alkaline and strong acidic (pH <5.4) solutions all have a significant impact on elastomeric chain force degradation. The force level of elastomeric chains degrades rapidly over time; however, the force degradation rate is slower in thermoset chains than in thermoplastic ones. An efficient tooth movement could be achieved by using a thermoset chain type with monthly replacement. Ethylene oxide and gamma sterilization methods are preferred to avoid the risk of cytotoxicity.
In the present study, semi – batch experiments were conducted to investigate the efficiency of ozone microbubbles (OMBs) in the treatment of aqueous dye solutions methylene orange under different reaction conditions such as effect of initial solution pH , ozone generation rate and initial MO-concentration. The results showed that the removal of MO by OMBs were very high at the acidic and alkaline media and upon increasing the generation rate of ozone from 0.498 to 0.83 mg/s, the removal efficiency dramatically increased from 75to 100% within 15 min. The rate of oxidation reaction followed a pseudo first- order kinetic model. The results demonstrated that OMBs is efficient in terms of the decline of methylene orange c
... Show MorePurpose: This study aimed to assess the thickness of alveolar bone of maxillary and mandibular incisors from orthodontics perspective. Materials and Method: A total of 73 Cone beam computed tomography for Iraqi patients (47 females and 26 males) were included in this study. The selected images were captured and imported to AutoCAD database software to perform the measurement. To measure alveolar bone thickness, a reference line was drawn through the long axis of each incisor, from the incisal edge to the root apex. Then, labial and lingual/palatal perpendicular lines were drawn to the reference line at 3, 6, and 9mm apically from the cemento-enamel junction (CEJ). Results: The buccal bone is generally thinner than the lingual/palata
... Show MoreOne of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an
... Show MoreThroughout what mentioned above, It is obvious that the aware narrator in these biography models was the strongest tool in presenting the content, especially the biographies under study were written by feminine hands, striving to prove her identity by all means and ways. In addition, we can suppose that the hiding of she writer behind the character is no more than a mask, by which she want to mask herself so that she can express herself frankly and freely, especially when she talks about subjects that are inconsistent with the society, customs and traditions. It is important to refer that the existence of the participant narrator in the biographies under study does not prevent the presence of another narrator such as external or aware na
... Show MoreIn recent years, there has been a significant increase in research demonstrating the new and diverse uses of non-thermal food processing technologies, including more efficient mixing and blending processes, faster energy and mass transfer, lower temperature and selective extraction, reduced thermal and concentration gradients, reduced equipment size, faster response to extraction control, faster start-up, increased production, and a reduction in the number of steps in preparation and processing. Applications of ultrasound technology have indicated that this technology has a promising and significant future in the food industry and preservation, and there is a wide scope for its use due to the higher purity of final products and the
... Show MorePathological blood clot in blood vessels, which often leads to cardiovascular diseases, are one of the most common causes of death in humans. Therefore, enzymatic therapy to degrade blood clots is vital. To achieve this goal, bromelain was immobilized and used for the biodegradation of blood clots. Bromelain was extracted from the pineapple fruit pulp (Ananas comosus) and purified by ion exchange chromatography after precipitation with ammonium sulphate (0-80 %), resulting in a yield of 70%, purification fold of 1.42, and a specific activity of 1175 U/mg. Bromelain was covalently immobilized on functionalized multi-walled carbon nanotubes (MWCNT), with an enzyme loading of 71.35%. The results of the characterization of free and immobilized
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show More