Background: Elastomeric chains are one of the most commonly used force delivery systems. They have the ability to exert a continuous force, convenience of use, compatibility to oral environment and cost effectiveness but one of the inherited disadvantages is force degradation. Materials and methods: This in vitro study was designed to evaluate the effect of alcohol presence in mouthwashes on force decay of different configurations of clear elastomeric chains from (Ortho Technology company) which are: closed , short and long under the effect of time at (Initial, 1, 2, 3 and 4 weeks) intervals with exposure to different chemical solutions. A total (540) modules of elastomeric chains of three different types (long, short and closed) transparent in color, with an initial length (19mm) and about 50% extension (29mm) were used for the study. These elastomeric chains divided in to four groups and exposed to different chemical solutions (Listerine Original alcoholic mouthwash, Listerine Zero alcohol mouth wash, Ethanol 26.9%, distilled water) twice daily for 60 seconds according to manufacturer instructions to measure the amount of force degradation in different time intervals. These elastomeric chains were incubated in covered glass containers at 37C˚ for the entire testing period. Results: Statistical analysis showed that there was a highly significant difference in the mean percentage of force decay (P≤ 0.001). For all chemical solutions the highest percentage of force decay occurs in Listerine Original Alcoholic mouth wash. Also in all chemical solutions closed elastomeric chains has the least percentage of force decay. While closed configuration have the highest percentage of force decay. Conclusion: We can conclude that alcoholic mouth wash(Listerine Original) causes increase force degradation of all types of elastomeric chains while alcohol free mouth wash (Listerine Zero) causes less force degradation of all types of elastomeric chains. Also closed configuration elastomeric chains have the least percentage of force decay than other configurations.
Strategic Cost Management Tools Under Technological Development and Change in Customer Tastes Critical Studies
This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreBackground: The protective roles of vitamin C and total proteins in gingival inflammation were reported by several studies. The aim of this study was to measure the concentration of salivary vitamin C, total protein and their relation to gingival health among dental students. Materials and methods: The sample consisted of 67 dental students (33 males and 34 females) from College of Dentistry, University of Baghdad. Sillness and Löe (1964) was used for recording of dental plaque, while the gingival index (GI) was measured according to Löe and Sillness criteria (1963). Stimulated salivary samples were collected and chemically analyzed in Poisoning Center/Surgical Specialty Hospital by using colorimetric method to measure the salivary v
... Show MoreType 1 diabetes (T1D) is an autoimmune disease with chronic nature resulting from a combination of both factors genetic and environmental. The genetic contributors of T1D among Iraqis are unexplored enough. The study aimed to shed a light on the contribution between genetic variation of interleukin2 (IL2) gene to T1D as a risk influencer in a sample of Iraqi patients. The association between IL2−330 polymorphism (rs2069762) was investigated in 322 Iraqis (78 T1D patients and 244 volunteers as controls). Genotyping for the haplotypes using polymerase chain reaction test – specific sequence primer (PCR-SSP) for (GG, GT, and TT) genotypes corresponding to (G and T) alleles were performed. A significant association revealed a decreased freq
... Show MoreThe covid-19 pandemic sweeping the world and has rendered a large proportion of the workforce as they are unable to commute to work. This has resulted in employees and employers seeking alternative work arrangements, including the software industry. Then comes the need for the global market and international presence of many companies to implement the global virtual teams (GVTs). GVTs members are gradually engaged in globalized business environments across space, time and organizational boundaries via information and communication technologies. Despite the advancement of technology, the project managers are still facing many challenges in communication. Hense, to become a successful project manager still a big challenge for them. This study
... Show MoreDBN Dr. Liqaa Habeb, International Journal of Multidisciplinary Reseach, 2015
Objective: To evaluate biomarkers of insulin resistance and acute phase reactants in obese, overweight and lean subjects and investigate the associations among those biomarkers. Methodology: This cross sectional study included 158 subjects who were stratified into three groups. Group1 comprised 53 obese patients (BMI≥ 30 kg/m2); group 2 were 54 overweight subjects, and group 3 had 51 healthy lean (BMI
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More