Background: Lack of durability of the bond of the dental adhesive systems to tooth structure is one of the most important problems in tooth colored restorative work. This in vitro study was performed to evaluate the effect of 2% chlorhexidine gluconate(CHX) on dentin bond strength by using total etch adhesive system at twenty-four hours and three months of water storage. Material and methods:A flat dentin surface was prepared for forty sound human maxillary premolar teeth which were acid etched with 36% phosphoric acid gel after being divided randomly into four groups of ten teeth each according to storage time and CHX application, theCHX was applied for 60 seconds before adhesive application for groups I and III which were tested after twenty-four hours and three months respectively, while the distal water was applied for 60 seconds before the application of adhesive for group II and IV which were tested after twenty-four hours and three months respectively.The Prime and Bond® NT™ adhesive (Dentsply) was applied and cured, Composite (Ceram X mono, Dentisply) was applied through special mold with 2 mm thickness and light cured, Then all specimens were stored in distilled water 37oC until the time of testing of each group.Shear bond strength test was performed at the end of the storage period (24 hours or 3 months). Results:T-test results showed high statistically significant reduction in shear bond strength (SBS) in non CHX group IV (tested after 3 months) compared to non CHX group II (tested after 24 hours)(P< 0.01). In CHX groups I (tested after 24 hours) and III (tested after 3 months), results showed no statistically significant differences in shear bond strength(p> 0.05).On the other hand result showed statistically no significant differences between groups I and II in 24 hours shear bond strength (P> 0.05). After 3 months water storage, there was statistically high significant differences between the groups III and IV (P< 0.01). Conclusion: the use of 2 % CHX glocounate solution after acid etching and before bonding of dentin have no adverse effect on immediate bond strength (24 hours storage), and was effective in reducing degradation of resin-dentin bond interface after three months of water storage.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather
... Show MoreThe dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreDevelopments are carried out to enhance the performance of vertical axis wind turbines (VAWT). This paper studies the performance of the ducted wind turbine with convergent duct (DAWT). Basically, the duct technique is utilized to provide the desired wind velocity facing the turbine. Methodology was developed to estimate the decisive performance parameter and to present the effect of the convergent duct with different inlet angles. The ducted wind turbine was analyzed and simulated using MATLAB software and numerically using ANSYS-Fluent 17.2. Result of both approaches were presented and showed good closeness for the two cases of covering angles 12 and 20 respectively. Results also showed that the convergent duct with an inlet angl
... Show MoreAn electrolytic process for the removal of Zn(II) from aqueous solution using a parallel amalgamated copper screens cathode operated in the flow through mode is proposed. The current-potential curves recorded at a rotating amalgamated copper disc electrode were used to determine diffusion coefficient of Zn(II). The performance of electrolytic reactor was investigated by using different flow rates at initial zinc ion concentration(48 mg/L). Taking into account the residential Zn(II) concentration, the best results were obtained for cathode potential of (-1.35 V vs. SCE) at flow rate (320 L/h). Zinc ion concentration was found to decrease from 48 mg/L to 1 mg/L during 120 min. of electrolysis. The experimental data are well correlate
... Show More