Preferred Language
Articles
/
pRf7LZIBVTCNdQwC96fn
Poly-ether-ether-ketone (PEEK) versus dead-soft coaxial bonded retainers: a randomized clinical trial. Part 1. Stability, retainer failure, and participant satisfaction
...Show More Authors
Abstract<sec> <title>Background

Poly-ether-ether-ketone (PEEK) was introduced in dentistry as an alternative to metal alloys.

Objective

To assess the effectiveness of PEEK-fixed retainers in preserving the stability of mandibular anterior and participant satisfaction as compared to the Dead-soft coaxial fixed retainer (DSC).

Trial design

A single-centre, two-arm parallel groups randomized clinical trial.

Methods

The patients treated with pre-adjusted orthodontic appliances who have a Little’s Irregularity Index (LII) ≤ 0.5 mm have been enrolled in the trial. PEEK retainers were prepared to round 0.8 mm wire by computer-aided design and manufacturing, and the DSC wire was carefully adapted to the lingual surface of the lower anterior teeth. The primary outcome was the stability of lower anterior teeth as assessed by LII, while the secondary outcomes were changes in occlusal parameters, retainer failure, and patient satisfaction. The data were collected at the debonding stage (T0), 1 month (T1), 3 months (T3), and 6 months (T6) after starting the trial, except for patient’s satisfaction, which was recorded using an electronic form at T1 and T6.

Blinding

Single blinding of participants.

Results

A total of 46 participants with an age range of 12–28 years old were randomly allocated to the two groups (n = 23 in each). Only one participant dropped out; therefore, 45 participants were analysed. The DSC group showed a significant increase in LII at T3. Both retainer groups had comparable occlusal measurements, failure frequency, and survival time, with no significant difference. The patients in the DSC group reported a statistically significant perception of change in the position of their teeth compared to those in the PEEK group.

Harms

No harmful effects have been reported.

Limitations

Limited follow-up duration and the inability to blind the operator due to the nature of the intervention.

Conclusions

After 6-month retention, the PEEK retainer was equally effective to DSC retainers in maintaining the teeth alignment, with no significant differences regarding the failure frequency, survival rate, and general patient satisfaction.

Trial registration

https://register.clinicaltrials.gov. (NCT05557136).

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Journal Of Intelligent &amp; Fuzzy Systems
A note on “separation axioms in fuzzy bitopological spaces”
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Bayes Estimator as a Function of Some Classical Estimator
...Show More Authors

Maximum likelihood estimation method, uniformly minimum variance unbiased estimation method and minimum mean square error estimation, as classical estimation procedures, are frequently used for parameter estimation in statistics, which assuming the parameter is constant , while Bayes method assuming the parameter is random variable and hence the Bayes estimator is an estimator which minimize the Bayes risk for each value the random observable and for square error lose function the Bayes estimator is the posterior mean. It is well known that the Bayesian estimation is hardly used as a parameter estimation technique due to some difficulties to finding a prior distribution.

The interest of this paper is that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 15 2025
Journal Name
Route Educational And Social Science Journal
A PSYCHOSOCIAL ANALYSIS OF APPROACHING ZANZIBAR BY TINA HOWE
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Fri Aug 30 2019
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of the English Preposition 'in'
...Show More Authors

The present study aims at analyzing the polysemy of the English preposition in from the cognitive linguistic (CL) point of view using Evans' and Tyler's approach (2003). The perplexity faced by Iraqi second language learners (L2) due to the multi-usages of this preposition has motivated the researcher to conduct this study. Seventy-six second year university students participated in this experimental study. The data of the pre-test and post-test were analyzed by SPSS statistical editor. The results have shown the following: First, a progress of more than (0.05≤) has been detected as far as students' understanding of the multiple usages of the preposition in is concerned. Second, the results of the questionnaire have s

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Wed Dec 03 2014
Journal Name
Al-kindy College Medical Journal
Limping in twenty years old male A Case Report
...Show More Authors

Background: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date. Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magneti

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
A Heuristic Approach to the Consecutive Ones Submatrix Problem
...Show More Authors

Given a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Fri Feb 02 2024
Journal Name
Kurdish Studies
A Linguistic Study of Metaphorical Expressions in Political Interviews
...Show More Authors

In recent years, the linguo-philosophical studies of metaphor have tended to define metaphor as an interaction of the object, that is the referent of conceptualization and some features that are associated with sensual manner realities, whose name is used when resolving the conceptual problem-nominative situation, namely the situation of the formation of a new concept and its verbalization. The objective of this term paper lies in the phenomenon of metaphors used in modern political discourse. In our understanding a metaphor is not only of a linguistic nature, but also political. This paper approaches the subject of conceptual metaphor and political argumentation through the prism of synergies of the political topic, affirmative or negative

... Show More
View Publication Preview PDF