The dynamic thermomechanical properties, sealing ability, and voids formation of an experimental obturation hydroxyapatite-reinforced polyethylene (HA/PE) composite/carrier system were investigated and compared with those of a commercial system [GuttaCore (GC)]. The HA/PE system was specifically designed using a melt-extrusion process. The viscoelastic properties of HA/PE were determined using a dynamic thermomechanical analyser. Human single-rooted teeth were endodontically instrumented and obturated using HA/PE or GC systems, and then sealing ability was assessed using a fluid filtration system. In addition, micro-computed tomography (μCT) was used to quantify apparent voids within the root-canal space. The data were statistically analysed using one-way anova and post hoc tests. The HA/PE composite exhibited important modulus and damping changes with an increase of temperature. The HA/PE system was more flexible than GC as the modulus of GC appeared to be significantly higher than that of HA/PE as a result of the high positive glass transition temperature (Tg). However, HA/PE and GC presented similar sealing abilities. In conclusion, because sealing ability and voids formation were comparable between the tested materials, the experimental HA/PE system may be considered a suitable alternative material for root-canal obturation. Moreover, HA/PE possesses specific viscoelastic behaviour and lower melting points, which may facilitate root-canal retreatments.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MorePurpose: To determine the impact of service encounter in stimulating voluntary customer behaviors.
- Approach / methodology: It was selected a sample of customers Bank Iraqi Trade (TBI) was (105) individual, using a questionnaire designed in the light of previous studies, was drafted scale and tested in the light of a group of statistical methods developed (reliability coefficient, reliability coefficient composite, convergence). Then test hypotheses through structural equation modeling.
- Results: The behaviors and characteristics of the service provider in effect urged bank customers to perform voluntary extra, as the service environment service encounter
The present study was investigated the activity of aqueous extract from Cinnamomum cassia bark on the blood glucose levels in healthy and diabetic rats induced by Streptozotcin (STZ). In healthy rats the blood glucose levels were slightly decreased after six hoursof single oral administration with dose (25 mg/kg) of body wight, as well as four weeks after twice daily repeated oral administration of aqueous extract of Cinnamomum cassia bark. In streptozotocin induced diabetic rats we absorved high significant decreased (p<0.05) in blood glucose levels, after four weeks of oral administration of aqueous extract (25 mg /kg ).And blood glucose levels seems to be normal after the period of treatment .Glibenclamide used as standard drug to com
... Show MoreThe magnetic properties of a pure Nickel metal and Nickel-Zinc-Manganese ferrites having the chemical formula Ni0.1(Zn0.4Mn0.6)0.9Fe2O4 were studied. The phase formation and crystal structure was studied by using x-ray diffraction which confirmed the formation of pure single spinel cubic phase with space group (Fd3m) in the ferrite. The samples microstructure was studied with scanning electron microstructure and EDX. The magnetic properties of the ferrite and nickel metal were characterized by using a laboratory setup with a magnetic field in the range from 0-500 G. The ferrite showed perfect soft spinel phase behavior while the nickel sample showed higher magnetic loss an
... Show More