Preferred Language
Articles
/
jbcd-317
Comparison of metal ions release and corrosion potential from different bracket archwire combinations (An in vitro study)
...Show More Authors

Background: Esthetic treatment is the options of patient seeking orthodontic treatment. Therefore this study was conducted to measure the concentration of Aluminum, Nickel, Chromium and Iron ions released from combination of monocrysralline brackets with different arch wires immersed in artificial saliva at different duration, to evaluate the corrosion point on different parts of the orthodontic appliances before and after immersion in artificial saliva, and to evaluate the corrosion potential of each group of the orthodontic appliances. Material and methods: Eighty orthodontic sets prepared. Each set represents half fixed orthodontic appliance, from the central incisor to the first molar, for the maxillary arch, each set consisted of molar band, five brackets, half arch wire and ligature elastic.These sets are divided into two groups: Group A: with monocrystalline brackets divided into five subgroups (each subgroup has ten sets), but differ in arch wires, as numbered stainless steel, nickel-titanium, thermally activated, coated stainless steel and coated nickel-titanium arch wires respectively. Group B: with stainless steel brackets divided into three subgroups (also each subgroup has ten sets), but differ in arch wires, as numberedstainless steel, nickel-titanium, and thermally activated arch wires respectively. Used optical microscope to check the corrosion points, and used potentiostat techniques to indicate corrosion rate and tendency. Results: The greatest concentration of Aluminum and nickel ions release during the 1st week in group A, then sharply decreased in the 2nd week. The release of chromium ion released increase with increase intervals, while iron ion released decrease with increase time. Both nickel and chromium ions increase with increase intervals in group B,while iron increase to the maximum at 3rd weeks, then began to degrease. Optical microscope displayed pitting, crevices, and intergranular corrosion. Potentiostat techniques indicated that increase corrosion when used stainless steel and coated nickel titanium than others arch wires with group A, while corrosion increase with nickel titanium than stainless steel arch wires with group B. Conclusions: Non-significant difference in the total nickel, chromium and iron release in group B. Aluminum and iron increase in A4 and A5, while nickel and chromium increase in A1 and A2.The total released amounts of metals ions in both groups were less than the amounts of daily intake.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 13 2026
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
International Journal Of Advanced Intelligence Paradigms
Assessing IRPS as an efficient pairwise test data generation strategy
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An adaptive neural control methodology design for dynamics mobile robot
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
An Investigation into Heat Transfer Enhancement by Using Oscillating Fins
...Show More Authors

The present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Results In Physics
An efficient iterative method for solving the Fokker–Planck equation
...Show More Authors

View Publication
Crossref (11)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
On Fully Stable Banach Algebra Modules Relative to an Ideal
...Show More Authors

In this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref