To evaluate the efficiency and effectiveness of three minimally invasive (MI) techniques in removing deep dentin carious lesions. Forty extracted carious molars were treated by conventional rotary excavation (control), chemomechanical caries removal agent (Brix 3000), ultrasonic abrasion (WOODPECKER, GUILIN, China); and Er, Cr: YSGG laser ablation (BIOLASE San Clemente, CA, USA). The assessments include; the excavation time, DIAGNOdent pen, Raman spectroscopy, Vickers microhardness, and scanning electron microscope combined with energy dispersive X-ray spectroscopy (SEM–EDX). The rotary method recorded the shortest excavation time (p < 0.001), Brix 3000 gel was the slowest. DIAGNOdent pen values ranged between 14 and 18 in the remaining dentin and laser-ablated surfaces recorded the lowest reading (p < 0.001). The Ca:P ratios of the remaining dentin were close to sound dentin after all excavation methods; however, it was higher in the ultrasonic technique (p < 0.05). The bur-excavated dentin showed higher phosphate and lower matrix contents with higher tissue hardness that was comparable to sound dentin indicating the non-selectiveness of this technique in removing the potentially repairable dentin tissue. In contrast, the MI techniques exhibited lower phosphate and higher organic contents associated with lower microhardness in the deeper dentin layers. This was associated with smooth residual dentin without smearing and patent dentinal tubules. This study supports the efficiency of using MI methods in caries removal as conservative alternatives to rotary excavation, providing a promising strategy for the clinical dental practice.
In this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tra
... Show MoreABSTRACT The role of specific amino acids namely cysteine, methionine, threonine and asparagine in the protection provided by vamin solution against B-lactam inhibition to E. coli was evaluated in vitro. In minimal medium, Cells were treated with 32 ug/ml of penicillin G, carbencillin, hostacillin, cloxacillin and cephalotin in the presence of specific amino acid supplementations. Deletion of specific amino acids from the media abolished the protection provided by vamin. Threonine was essential for the protection of cells against all tested antibiotics, while cysteine was essential for protection against carbencillin and cephalotin Deletion of methionine or asparagine abolished the protec- tion against carbencillin and to a less extent ce
... Show MoreThe role of specific amino acids namely cysteine, methionine, threonine and asparagine in the protection provided by vamin solution against B-lactam inhibition to E. coli was evaluated in vitro In minimal medium, cells were treated with 32 ug/ml of penicillin G, carbenciLlin, hostacillin, cloxacillin and cephalotin in the presence of specific amino acid supplementation. Deletion of specific amino acids from the media abolished the protection provided by vamin. Threonine was essential for the protection of cells against all tested antibiotics, while cysteine was essential for protection against carbencillin and sephalotin. Deletion of methionine or asparagine abolished the protection against carbencillin and to a less extent cephalotin.
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreIntroduction: This study was designed to examine the effects of addition of the combination of polymerized polymethyl methacrylate (PMMA) and zirconia (ZrO2) particles to heat cure PMMA resin on impact strength, surface hardness, and roughness. Methods: The 70% (w/w) of polymerized PMMA powder (particle size: 0.70mm) was mixed with 30% (w/w) of zirconia powder (ZrO2) (1mm) to produce PMMA-ZrO2 filler. Ninety acrylic specimens created were divided into three groups containing 0% wt (Control group), 2% wt, and 4% wt, PMMA-ZrO2 filler. Ten specimens were used for impact strength, surface hardness and roughness test, blindly. Data were analyzed via oneway ANOVA and the Tukey post hoc test using R 3.6.3. Results: There was statistically signific
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreIn this paper we reported the microfabrication of three-dimensional structures using two-photon polymerization (2PP) in a mixture of MEH-PPV and an acrylic resin. Femtosecond laser operating at 800nm was employed for the two-photon polymerization processes. As a first step in this project we obtained the better composition in order to fabricate microstructers of MEH-PPV in the resin via two-photon polymerzation. Acknowledgement:This research is support by Mazur Group, Harvrad Universirt.
Corruption is a phenomenon that exists in all times and places, they appear in the developing countries and in developed countries, and in all political systems. And its repercussions and economic repercussions on the society in which it is rampant, and lead to the undermining of economic development and obstruction, is also working on increasing poverty and unemployment, as well as its role in the worsening of social problems, and political instability. And corruption is deviant behavior is illegal and contrary to the teachings of the religious and moral values. The emergence of this phenomenon is due to several reasons, including political, economic, social and cultura
... Show MoreIn Iraq, government contributions to the public companies have become a very important aspect which contributes to the survival and sustainability of these institutions as it consider one of the main sources of funding, if not it consider the basis of funding.
According to the vital roles assigned to these institutions to follow up, which usually include important activities in the national economy, the research focused on studying the field reality of the method used in evaluating the stock of total production and purchases of goods for the purpose of selling the strategic commodities of the General Company for Grain Trade. As a result, the aim of this study came to came to highlight&n
... Show More