Background: The treatment of dental tissues proceeding to adhesive procedures is a crucial step in the bonding protocol and decides the clinical success ofrestorations. This study was conducted in vitro, with the aim of evaluating thenanoleakage on the interface between the adhesive system and the dentine treated by five surface modalities using scanning electron microscopy and energydispersiveX-ray spectrometry. Materials and methods: Twenty five extracted premolars teeth were selected in the study. Standardized class V cavities were prepared on the buccal and lingual surfaces then the teeth divided into five main groups of (5 teeth in each group n=10) according to the type of dentine surface treatment that was used: Group (A): dentine was conditioning with Er, Cr: YSGG laser. Group (B): dentine was conditioning with (Er, Cr: YSGG laser + acid). Group (C): dentine was conditioning with (acid + Er, Cr: YSGG laser). Group (D): dentine was conditioning with acid etch. Group (E): dentine was conditioning with acid + 10% sodium hypochlorite. For All the teeth SBMP adhesive were used and restored with Z250 composite restoration then all specimens were subjected to thermocycling 500 cycles, at 5° to 55 °C. The teeth were soaked in silver nitrate suspension. Then the teeth sectioned bucco-lingually across the centre of the restorations. The specimens were characterized using scanning electron microscopy and the amount of nanoleakage was measured by EDX spectro-analysis to identify the existence of metallic silver particles. Results: Data were analysed statistically by one way ANOVA test and (LSD) Tests. The results showed that there were statistically highly significant differences among all groups of the present study.The resultshowed that the acid and laser (group III) exhibited the lowest mean value of nanoleakage at around (6.14 %), whereas the highest mean value of nanoleakage (12.83 %) was determined by the only acid (group IV). Conclusions: Treating the acid etched dentine with Er: Cr: YSGG laser showed promising results as it exhibits lowest amount of nanoleakage of the adhesive bonding system.
The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreThe current study aims at using non-hatchable artemia eggs of local origin and making use of these eggs by decapsulating and presenting them as food for the larvae of the Cyprinus carpio as a source of animal protein with high nutritional value instead of throwing them away. The results showed that the second parameter (A2) was highly significant at the level (P≤0.05) in the growth rates of the larvae that were fed on decapsulated artemia eggs alone, and it was better than the two control parameters (A1), in which the larvae were fed with feed designated for Cyprinus carpio fish. It also outperformed the third parameter (A3), in which the feed was mixed with artemia eggs with 50% decapsulation, which also outperformed the control paramete
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThe main objective of this work was to adopt an environmentally friendly technology with enhanced results. The technology of magnetic water (MW) treatment system can be used in concrete mixture production instead of potable water (PW) to improve both workability and strength. Two types of concrete were adopted: normal concreter production with two grades 25 and 35 MPa and the self-compacted concrete (SCC) with 35 MPa grade. The concrete mixes containing MW instead of PW results showed that, for 25 MPa grade, an improvement in a compressive strength of 15.1, 14.8, and 10.2% was achieved for 7, 28, and 90 days, respectively. For 35 MPa grade, an improvement of 13.6, 11.5, and
The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreData Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreMany purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreCommunity detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a
... Show More