Preferred Language
Articles
/
rxfOoZIBVTCNdQwClruj
Bond Strength Survival of a Novel Calcium Phosphate-Enriched Orthodontic Self-Etching System after Various Ageing Protocols: An In Vitro Study
...Show More Authors

Objective. This study aimed to evaluate the orthodontic bond strength and enamel-preserving ability of a hydroxyapatite nanoparticles-containingself-etch system following exposure to various ageing methods. Materials and Methods. Hydroxyapatite nanoparticles (nHAp) were incorporated into an orthodontic self-etch primer (SEP, Transbond™ plus) in three different concentrations (5%, 7%, and 9% wt) and tested versus the plain SEP (control) for shear bond strength (SBS), adhesive remnant index (ARI) scores, and enamel damage in range-finding experiments using premolar teeth. The best-performing formulation was further exposed to the following four artificial ageing methods: initial debonding, 24 h water storage, one-month water storage, and one-month acid challenge. A field-emission scanning electron microscope (FE-SEM) was used to examine the integrity of debonded enamel surfaces and calcium-phosphates (CaPs) reprecipitation. Results. The best-performing formulation (7% nHAp-SEP) resulted in significantly lower SBS ( p < 0.001 ) than the control SEP following the four artificial ageing methods. Nevertheless, it survived the ageing protocols and yielded clinically acceptable SBS with the advantages of leaving minimal adhesive residue, preserving enamel integrity and smoothness, and inducing CaP reprecipitation as confirmed by FE-SEM images. Conclusions. A newly developed SEP produced adequate orthodontic bond strengths and left unblemished debonded enamel surfaces with minimal remnant adhesive and remineralisation potential, thereby suggesting simpler and safer bonding/debonding procedures.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed May 29 2019
Journal Name
Iraqi Journal Of Physics
The influence of various pH values on the aerogel physical properties by sol-gel technique
...Show More Authors

Hydrophobic silica aerogels were successfully preparation by an ambient pressure drying method from sodium silicate (Na2SiO3) with different pH values (5, 6, 7, 8, 9 and 10). In this study, acidic HCl (1M), a basic NH4OH (1M) were selected as a catalyst to perform the surface modification in a TMCS (trimethylchlorosilane) solution. The surface chemical modification of the aerogels was assured by the Fourier transform infrared (FTIR) spectroscopic studies. Other physical properties, such as pore volume and pore size and specific surface area were determined by Brunauer-Emmett- Teller (BET) method. The effect of pH values on the bulk density of aerogel. The sol–gel parameter pH value in the sol, have marked effects on the physical proper

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
Isolation and identification of phosphate solubilizing bacteria and evaluate its effect on of Mung bean (Vigna radita [L.] R.Wilczek) growth
...Show More Authors

Sixteen soil samples were collected from wheat, barley and yellow corn rhizosphere in Abu-Ghraib, Aqraqof, Latifieh,Tarmiah, Jadriya and  of Agriculture in Baghdad university/ Baghdad city. The results found nine phosphate solubilizing bacteria (PSB) isolates (Y1, Y2, Y3, Y4, Y5, Y6, Y7, Y8, Y9), formed clear zones on National Botanical Research Institute's (NBRIP) agar. The solubility index (SI) of PSB isolates ranged from 2.00 to 3.66. Y4 have the highest SI (3.66) followed by Y3 and Y6 (3.33). Phosphate solubilization abilities varying from (20.10-39.00 μg.ml-1), Y4 was the highest (39.00 μg.ml-1) followed by Y3 (37.00μg.ml-1). The results of hydrolytic enzymes production showed that almo

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
A Phonological Study of English and Arabic Assimilation : A Contrastive Study
...Show More Authors

        Assimilation is defined ,by many phoneticians like  Schane ,Roach ,and many others, as a phonological process when there is a change of one sound into another because of  neighboring sounds.This study investigates the  phoneme assimilation as a phonological process in English and Arabic  and it is concerned specifically with the differences and similarities in both languages.   Actually ,this study reflects the different terms which are used  in Arabic to refer to this phenomenon and in this way it  shows whether the term 'assimilation ' can have the same meaning of  'idgham' in Arabic or not . Besides, in Arabic , this phenomenon is discussed from&nb

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Dental Research Journal
Impact of a mixture of nanofiller and intrinsic pigment on tear strength and hardness of two types of maxillofacial silicone elastomers
...Show More Authors

Background: The ideal maxillofacial prosthesis should have fine and thin boundaries that bindwith the surrounding facial structures and possess high tear strength.This study aims to determinethe best percentages of nanofiller (TiO2) and intrinsic pigment (silicone functional intrinsic) thatcould be mixed in as additives to improve the tear strength of Cosmesil M511 andVST50F siliconeelastomers with the least effect on their hardness.Materials and Methods: In this in vitro experimental study, a total of 80 samples, 40 for eachelastomer, were fabricated. Each elastomer sample was split into two equal groups to test for tearstrength and Shore A hardness. Each group consisted of 20 samples, including 10 control sampleswithout additives and 10 e

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref