Background: The use of electronic apex locators for working length determination eliminates many of the problems associated with the radiographic measurements (interference of anatomical structures, errors in projection such as elongation or shortening, and lack of three-dimensional representation). Its most important advantage over radiography is that it measures the length of the root canal to the apical constriction, not to the radiographic apex. The aim of this study was to assess the accuracy of a new fifth generation apex locator (Joypex 5) in recording the apical constriction and comparing it with a third generation apex locator (Root ZX) in vitro. Materials and method: Twenty four single-rooted sound human premolars, extracted for the purpose of orthodontic treatment and with fully-formed roots, were used in this study. Endodontic access cavity was prepared in each tooth and canal patency up to the apical foramen was checked with a #15 stainless steel K-file. No root canal preparation was performed. Root canal length measurement was done directly and electronically using two apex locators (Joypex 5 and Root ZX). Direct measurement of the root canal length was done by introducing a #15 K-file inside the root canal until its tip was just visible at the apical foramen, then removed from the root canal and its length was measured (in mm) and subtracted by 0.5 mm. For electronic measurement, the teeth were fixed in a sponge soaked in saline and the root canals were also filled with saline. The lip electrode was attached to the sponge and the apex locators were used according to the manufacturers' instructions. The file holder was clipped to the metal shaft of a #15 K-file and the file was then inserted inside the root canal and advanced until the display reading on the LCD of the apex locator was "0.5". The file was then removed from the root canal and its length was measured (in mm). The differences between the readings of each apex locator and the actual length of each canal were computed, and the results were analyzed statistically by paired t-test using SPSS Version 13. Results: The results of this study showed that the Joypex 5 apex locator showed a lower mean difference than the Root ZX apex locator as compared with the actual length, which was statistically significant (p<0.05). Concerning the accuracy of the two apex locators, Joypex 5 apex locator recorded the apical constriction exactly in 67%, while the Root ZX apex locator in only 25%. Within ±0.5 mm from the actual length, the accuracy of the Joypex 5 and the Root ZX were 83% and 67%, respectively. Within ±1 mm from the actual length, the accuracy of the Joypex 5 and the Root ZX were 100% and 96%, respectively. Conclusion: The Joypex 5 apex locator which is a fifth generation apex locator was more accurate in recording the apical constriction as compared with the Root ZX apex locator which is a third generation apex locator.
An experiment was conducted in pots under field conditions during fall seasons of 2017 and 2018. This study aimed to improve a weak growth of seedlings under salt stress in sorghum. Three factors were studied. 1st factor was three cultivars (Inqath, Rabeh, and Buhoth70). 2nd factor was seed priming (primed and unprimed seed). Seed were primed by soaking for 12 hours in a solution containing 300 + 70 mg L−1 of gibberellic (GA3) and salicylic (SA) acids, respectively. 3rd factor was irrigation with saline water (6, 9 and 12 dS m−1) resulting from dissolving sodium chloride in distilled water in addition to control treatment (distilled water). Randomized complete block design was used with four replications. In both seasons: the results sh
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreIn this study, manganese dioxide (MnO₂) nanoparticles (NPs) were synthesized via the hydrothermal method and utilized for the adsorption of Janus green dye (JG) from aqueous solutions. The effects of MnO₂ NPs on kinetics and diffusion were also analyzed. The synthesized NPs were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), energy-dispersive X-ray analysis (EDX), and Fourier-transform infrared spectroscopy (FT-IR), with XRD confirming the nanoparticle size of 6.23 nm. The adsorption kinetics were investigated using three models: pseudo-first-order (PFO), pseudo-second-order (PSO), and the intraparticle diffusion model. The PSO model provided the best fit (R² = 0.999), indicating that the adsorpti
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure