Background: The formation of white spot lesions around fixed orthodontic attachments is a common complication during and after fixed orthodontic treatment, which hinders the result of a successfully completed orthodontic treatment. The aim of the study was to assess the effectiveness of the Caries Infiltrant (ICON®) on prevention of caries on the smooth enamel surface when applied alone or combined with conventional adhesives. Materials and methods: Seventy eight human premolar enamel discs were randomly assigned to six groups (n=13). The discs were etched and treated with resins of different monomer content forming the following groups: (1)Untreated etched samples served as the negative control, (2) ICON® (DMG), (3) Adper™ SB 2 (3M ESPE), (4) Heliobond (IvoclarVivadent), (5) ICON®+ Adper™ SB 2 and (6) ICON®+ Heliobond. Specimens were subjected to demineralization by immersion in hydrochloric acid (pH 2.6) for 18 days. Calcium dissolution into the acid was assessed by photometric test via spectrophotometer at 24 hour intervals. Results: The results revealed that, there was a highly significant difference between the sealed groups and the unsealed (untreated) one (p≤0.00) indicating that the unsealed specimens showed the highest amount of Ca ion loss among all other groups. Additionally, there was no significant difference between untreated specimens and the ICON® sealed ones. While, Heliobond decreased the Ca ion loss significantly compared to the untreated specimens and Adper™ SB 2 performed significantly better than both ICON® and Heliobond. Furthermore, the combination of ICON® with either Adper™ SB 2 or Heliobond served as the best protective measures and maintained the protective effect during the whole experiment period. Therefore, within the limitations of this in vitro study, it could be concluded that the use of Caries Infiltrant prior to the application of the tested conventional adhesives increases their protective effect against demineralization.
Eprospective study undertaken between January 2007 and January 2011, 58 consecutive cases with compound tibial shaft fractures. All fractures were stabilized by external fixator device AO/ASIF type after failed the manipulation under anesthesia (MUA) to restore the osseous alignment. In 32 patients cancellous bone graft were used from the upper part of the tibia to enhance healing process, all these patients were followed for an average of 8–12 months. Our findings showed that stabilization of the fracture shaft tibia by external fixation with cancellous bone graft had significantly better result, than external fixation alone. We conclude that unilateral, uniplanar external fixation with early bone grafting from upper part of the tibia is
... Show MoreThis paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used. Experimental results shows LPG-PCA method
... Show MoreCladophora and Spirulina algae biomass have been used for the removal of Tetracycline (TC) antibiotic from aqueous solution. Different operation conditions were varied in batch process, such as initial antibiotic concentration, different biomass dosage and type, contact time, agitation speed, and initial pH. The result showed that the maximum removal efficiencies by using 1.25 g/100 ml Cladophora and 0.5 g/100 ml Spirulina algae biomass were 95% and 94% respectively. At the optimum experimental condition of temperature 25°C, initial TC concentration 50 mg/l, contact time 2.5hr, agitation speed 200 rpm and pH 6.5. The characterization of Cladophora and Spirulina biomass by Fourier transform infrared (FTIR) indicates that the presenc
... Show MoreObjectives: Umbilical cord blood can be taken at birth and largely gives indication of fetal and maternal conditions. The aim of the study was to investigate the relation between sex hormones in cord blood and birth weight of newborns and pregnancy complications. Methods: Fifty cord blood samples were collected from newborns at labor room of Baghdad Teaching Hospital between May and October 2018. Blood was withdrawn from their mothers for lead analysis. Five milliliters (ml) of cord blood was taken, 3 ml was used for testosterone and estradiol analysis (using enzyme-linked immunosorbent assay) and 2 ml for lead measurement by lead care analyzer. Newborns weight and head circumference were measured. Delivered women were divided into four gro
... Show MoreVision loss happens due to diabetic retinopathy (DR) in severe stages. Thus, an automatic detection method applied to diagnose DR in an earlier phase may help medical doctors to make better decisions. DR is considered one of the main risks, leading to blindness. Computer-Aided Diagnosis systems play an essential role in detecting features in fundus images. Fundus images may include blood vessels, exudates, micro-aneurysm, hemorrhages, and neovascularization. In this paper, our model combines automatic detection for the diabetic retinopathy classification with localization methods depending on weakly-supervised learning. The model has four stages; in stage one, various preprocessing techniques are app
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreEmpirical equations for estimating thickening time and compressive strength of bentonitic - class "G" cement slurries were derived as a function of water to cement ratio and apparent viscosity (for any ratios). How the presence of such an equations easily extract the thickening time and compressive strength values of the oil field saves time without reference to the untreated control laboratory tests such as pressurized consistometer for thickening time test and Hydraulic Cement Mortars including water bath ( 24 hours ) for compressive strength test those may have more than one day.
This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More