Background: The purpose of the current study was to evaluate the efficacy of a new orthodontic bonding system (Beauty Ortho Bond) involving the shear bond strength in dry and wet environments, and adhesion remnant index (ARI) scores evaluation in regard to other bonding systems (Heliosit and Resilience Orthodontic Adhesives). Materials and methods: Sixty defect free extracted premolars were randomly divided into six groups of 10 teeth each, mounted in acrylic resin, three groups for a dry environment and three for a wet one. Shear bond strength test was performed with a cross head speed of 0.5 mm/min, while surfaces of enamel and bracket-adhesive-enamel surfaces were examined with stereomicroscope For ARI scores evaluation. Data were analyzed by one way analysis of variance, least significant difference, student's t-test, and Fisher exact test. Results: The mean shear bond strength showed highest values for Resilience adhesive followed by Beauty Ortho Bond and Heliosit adhesives respectively both in dry and wet environments. Interestingly, there was a non-significant difference (P<0.05) between Resilience and Beauty Ortho Bond adhesives using least significant difference at dry environment. In wet environment the Beauty Ortho Bond showed an acceptable mean shear bond strength value (6.39 Mpa) which is considered as a clinically acceptable value. Adhesive remnant index scores demonstrated a tendency towards score 1 in dry environment, and towards score 3 in wet environment, the scores also showed a non-significant difference (P<0.05) between Resilience and Beauty Ortho Bond adhesives using Fischer exact test. Conclusion: Beauty Ortho Bond is less sensitive to wet environment than Resilience and Heliosit adhesives, therefore it has an advantage during clean up, as it reduces the risk of enamel damage during debonding procedure. Keywords: Beauty Ortho Bond, Shear bond strength, light cured composite.
Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel
... Show MoreRecommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThe Local and Global Corporations are suffering of managerial and financial corruption phenomena, which leads them to loss and bankruptcy. So, it is necessary to search for tools which help prevent phenomena like this, and one of these tools is (corporate governance) which represent controlling tool that contribute in reducing corruption. this study aims at modifying (corporate governance system)in order to make it suitable with Iraqi government Corporations. the study depend upon main hypothesis which is (the performance level of the strategic perspective of governance system is depending upon work according to the perspective dimensions itself. From the main conclusions:-It is possible to building a strategic perspective
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreIn this paper, some relations between the flows and the Enveloping Semi-group were studied. It allows to associate some properties on the topological compactification to any pointed flows. These relations enable us to study a number of the properties of the principles of flows corresponding with using algebric properties. Also in this paper proofs to some theorems of these relations are given.
This work includes two steps of synthesis, the first one is the synthesis of indole which was prepared according to literature of the reaction of phenyl hydrazine with acetaldehyde in glacial acetic acid afforded phenyl hydrazone of acetaldehyde , this product was fused with zinc chloride to give the indole.Reaction of cyclohexanone with phenyl hydrazine using the same procedure for the preparing giving 1,2,3,4-Tetrahydrocarbazole.Second step involved synthesis of a series of (17) of mannich bases derivatives of indole and 1,2,3,4-Tetrahydrocarbazle. Mannich reaction involves the condensation of aldehyde usually formaldehyde with different secondary amine and with compound containing an activated hydrogen.The reaction illustrated by the fo
... Show MoreThis work contain many steps starting from esterification of isophthalic acid to yield diester compound [I] which was converted to their acid hydrazide [II], then the later compound reacted with ethylacetoacetate to yield pyrazol-5-one compound [III]. Afterword added acetyl chloride to give the compound [IV], the reaction of this compound with theiosemicarbazide led to produce a new carbothioamide compound [V], which was reacted with ethyl chloro acetate to yield the thioxoimidazolidin compound [VI]. The condensation reactions of this compound with different substituted aldehyde give new alkene derivatives [VII] ad. The synthesized compounds were characterized by melting points, FT-IR, 1H-NMR and Mass spectroscopy.