Background: With the increasing demand on esthetic orthodontic appliances, discoloration of clear elastomeric chains and modules remains an issue which concerns both orthodontics and patients. This in vitro study was conducted to evaluate the effect of exposing stretched clear elastomeric chains from six different companies (Ortho Technology, Ormco, Ortho Organizer, American Orthodontics, Opal and G&H companies) to three types of dietary media (tea, coffee and turmeric). Materials and methods: A total of 960 lengths of six modules were cut from short type elastomeric chain; 160 pieces from each brand. The specimens were stretched 50%, placed on plastic boards, and incubated in water at 37°C for 1 day, 7 days, 14 days and 28 days. Once a day, the specimens were immersed for ten minutes in the testing dietary media, washed and then returned back to the water container. Color measurements were made before and after incubation of the specimens. Digital image were taken by an SLR digital camera and the color changes were calculated according to CIE L*a*b* color space system by Adobe Photoshop program. The resulting data were statistically analyzed using ANOVA and LSD tests. Result: Elastomeric chains from AO, Opal and G&H companies were the most brands prone to discoloration. Ortho Organizers and Ortho Technology chains were the least prone to discoloration. Tea, coffee and turmeric solutions discolored elastomeric chains from all companies in a variable degree, however turmeric caused significantly more discoloration, followed by tea and least by coffee. The amount of discoloration caused by tea and coffee increases gradually to peak at 28 days, while most of the discoloration caused by turmeric was in the first day and reached a plateau in a week. Conclusion: To decrease the discoloration of clear elastomeric chains the consumption of colored dietary media especially spices like turmeric are to be discouraged.
The COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system
... Show MoreAny software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreIn this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
The study scrutinises intermingled relations between children literature and some ecological issues. Such interwoven relationships would be highly recommended to encourage children to explore and identify themselves with nature from early ages to avoid facing an extreme experience later on. The research limits its scope to two novels Suzanne Collins’ (1962) The Hunger Games trilogy (2003-2007) and William Golding’s (1911-1993) Lord of the Flies (1954), and both novels have no direct connections with Ecology and the Eco-consciousness, yet it offers an insightful description about Man’s experience with Nature. Moreover, it raises serious moral questions, raises awareness, heals wounds and suggests solutions for the problems th
... Show MoreA solar cell was manufactured from local materials and was dyed using dyes extracted from different organic plants. The solar cell glass slides were coated with a nano-porous layer of Titanium Oxide and infused with two types of acids, Nitric acid and Acetic acid. The organic dyes were extracted from Pomegranate, Hibiscus, Blackberry and Blue Flowers. They were then tested and a comparison was made for the amount of voltage they generate when exposed to sunlight. Hibiscus sabdariffa extract had the best performance parameters; also Different plants give different levels of voltage.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt