Forty lower premolars with single root canals prepared with ProtaperNext files to size 25, and obturated with GP/sealer using lateral compaction. Teeth divided randomly into four groups (group n=10). Protaper universal retreatment kit (PUR), D-Race desobturation files (DRD), R-Endo retreatment kit (RE) and Hedstrom (H) files (control) were used to remove GP/sealer in each group. Removal effectiveness assessed by measuring the GP /sealer remnants in the roots after sectioning them into two halves. Stereomicroscope with a digital camera used to capture digital images. Images processed by ImageJ software to measure the percentage of GP/sealer remnants surface area in total, coronal, middle and apical areas of the canal. In the coronal area, PUR had significantly lower R% than RE and H groups, respectively (p<0.05). Also, DRD had significantly lower R% than RE (P<0.05). There was no significant difference between PUR and DRD (p>0.05), as well as no significant difference between RE and H groups(p>0.05). In the middle, apical and total root areas, Both PUR and DRD had significantly lower R% than RE and H groups, respectively (p<0.05). There was no significant difference between PUR and DRD (p>0.05). Also, there was no significant difference in R% between RE and H groups (p>0.05).
Wastewater recycling for non-potable uses has gained significant attention to mitigate the high pressure on freshwater resources. This requires using a sustainable technique to treat natural municipal wastewater as an alternative to conventional methods, especially in arid and semi-arid rural areas. One of the promising techniques applied to satisfy the objective of wastewater reuse is the constructed wetlands (CWs) which have been used extensively in most countries worldwide through the last decades. The present study introduces a significant review of the definition, classification, and components of CWs, identifying the mechanisms controlling the removal process within such units. Vertical, horizontal, and hybrid CWs
... Show MoreThe research aims to test the relationship and impact of High Involvement Management as an independent variable in negotiation strategies as a response variable, at the headquarters of the Iraqi Ministry of Industry and Minerals in Baghdad Governorate, and then trying to come up with a set of recommendations that contribute to strengthening the negotiations carried out by the ministry’s leaders and based on the importance of the topic of research in public organizations and the importance of the surveyed organizations to the society. The descriptive-analytical approach was adopted in the completion of this research, and the research included a sample of (180) leaders of the Iraqi Ministry of Industry and Minerals, and data was
... Show MoreGod saw his servants with truth and light, and made him easy for them, and he commanded those who help them, including a counselor, guide and preacher, so if a Muslim sees deficiencies or defects, he must help him to reform and refine it. That it was in the hands of the prophets, God Almighty created the human being together straight, then melted on those scholars and researchers in all religions on psychological counseling and religious sychotherapy, stressing the importance of religious values in the process of understanding man in the process of psychotherapy and in controlling human behavior. A lot of research and studies have been published. I dealt with the religious approach in the process of treating mental disorders and the aim of
... Show MoreDBN Rashid, Talent Development & Excellence, 2020
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More