Background: The present study was conducted to evaluate the effects of different bleaching methods on the shear bond strength of orthodontic Sapphire brackets bonded to human premolars teeth using light cured composite resin and to determine the predominant site of bond failure. Materials and Methods: Thirty freshly extracted human premolars were selected and randomly divided into three groups (10 per group). These groups are: control (unbleached) group, hydrogen peroxide group (HP) 37.5% ; which is the in- office bleaching method group, carbamide peroxide group (CP) 16%; which is the at- home bleaching method group. After bleaching process was performed, all the teeth stored in distilled water in a sealed container at room temperature for 24 hours before bonding was initiated, then orthodontic brackets were bonded with a light cure composite resin, stored in distilled water at room temperature for another 24 hours before debonding then the brackets de-bonded and tested for shear bond strength using an Instron universal testing machine. For adhesive remnant index (ARI) the enamel surface and bracket base of each tooth were inspected under magnifying lens (20X) of a stereomicroscope. Results and Conclusions: Non-statistically significant differences of shear bond strengths were found between the control group and the bleached groups, the dental bleaching in both methods did not affect the SBS of Sapphire brackets. The mode of failure was mostly between the adhesive and the enamel and the bond failure between the bracket base and the adhesive were also observed. Keywords: Shear bond strength, tooth bleaching agents, orthodontic brackets, dental bonding.
Background: Acute myocardial infarction (AMI) is one of the most common diagnoses in hospitalized patients. Increased plasma hemostatic markers were noted in acute myocardial infarction, indicating that the blood coagulation system is highly activated in those patients. Aims of the study: To study the level of intrinsic coagulation factors including (FVIII:C, FIX:C ,FXI:C ,FXII:C ) in patients with acute myocardial infarction. Type of the study: Cross –sectional study. Methods: Thirty patients (their age range is 48-68 years) were included in this study (9 female, 21 male) who were just admitted to the coronary care unit in AL-Yarmouk Teaching Hospital and diagnosed as having acute myocardial infarction patients, blood samples were tak
... Show MoreCorruption has become the subject of great interest, and the subject of research and scrutiny in recent years, because of its penetration in all fields of life, whether these fields are political, economic, social, and administrative. It is one of the biggest challenges and problems that are facing communities. Therefore, this study is focused on the evaluation of measures implementing the national strategy to combat corruption in Iraq.
This study was launched, first because of its intellectual dimensions to ensure a conceptual presentation of the strategy and operational management in general with a special focus on the processes of implementation and control str
... Show MoreMJ Abbas, AK Hussein, Journal of Physical Education, 2019
Background: Wound healing, as a normal biological process in the human body, is achieved through four precisely and highly programmed phases: hemostasis, inflammation, proliferation, and remodeling. Growth factors released in the traumatized area promote cell migration into the wound area (chemotaxis), stimulate the growth of epithelial cells and fibroblasts (mitogenesis), initiate the formulation of new blood vessels (angiogenesis), and stimulate matrix formation and remodeling of the affected region. One of factors that effects on wound healing is a sex hormones and one of these hormones is an estrogen hormone. A wide range of cutaneous cell types (eg, fibroblast, endothelial, epithelial, and inflammatory) expressed estrogen receptors, in
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More