Background: The isthmus is a difficult area in the root canal complex to manage. The research aimed to evaluate the efficiency of three different obturation techniques (lateral condensation, EandQ (thermoplasticized gutta percha system) and Soft Core (thermoplasticized core carrier gutta percha system)) to obturate the isthmus area of roots prepared by two different instrumentation techniques (rotary ProTaper universal and ProTaper Next systems). Material and method: Sixty freshly extracted teeth were randomly divided into two main groups (A and B) of 30 teeth each. Group A was prepared by rotary ProTaper Universal whereas group B was prepared by ProTaper Next system. Each main group was then randomly subdivided into three subgroups of 10 teeth each, to be obturated with the three obturation techniques. All specimens were then placed in cold cure acrylic mold just from the side of the crown leaving the root unmolded to facilitate the sectioning process, then three sections were obtained from each specimen by using microtome at 2, 6 and 10 mm from the apex. Each section was viewed under stereomicroscope(40X) and imaged with digital camera(4X). Each image was managed with image J program to calculate the surface area of the whole isthmus and that of the gutta percha and/or sealer extended into the isthmus so the collected data represented the percentage of extension degree of gutta percha and /or sealer into the isthmus(EDGS). Results: The highest mean value of (EDGS) was evident with Soft Core technique in the apical area and was significantly higher than that of the EandQ and lateral condensation techniques. Conclusion: Under the conditions of this study, Soft Core system showed a higher efficiency in obturating the isthmus area than the other obturation techniques.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreParasitological examination of gills of three species of sparid fishes in the territorial waters of Iraq was performed, two diplectanid monogenoids were isolated and described; Lamellodiscus indicus Tripathi, 1959 from both Haffara seabream Rhabdosargus haffara (Forsskål, 1775) and Goldline seabream R. sarba (Forsskål, 1775) and Protolamellodiscus senilobatus Kritsky, Jiménez-Ruiz and Sey, 2000 from King soldierbream Argyrops spinifer (Forsskål, 1775). The record of the parasites is considered new to the parasite fauna of Iraq. The redescription of L. indicus for the first time which is collected from a new distribution area (Arabian Gulf). R. haffara is considered a new host record .
Intestinal parasites present in freshwater from the Al- Fallujah, Al- Habbaniyah and Al-Alwarar, of the Euphrates river in Iraq are Cryptosporidium spp (25.3%), Giardia sp (3.3%), Eimeria sp (3.3%), Pinworm eggs (3.3%), Naegleria sp (15.3%), Lecane niwati (1.3%), Trichomonas hominis (19.3%), Acanthamoeba spp (24.6%), Entamoeba coli (20.6%), Balantidium coli (12%), Ascaris sp (3.3%), Volvox sp (26%), Chilomastix mesnili (4%), Pelomyxa palustris (2.6%), Trinema enchelys (2.6%), Actinophrys Sol (7.3%), Amobea Vespertilio (9.3%), Rhabditea (5.3%), paramecium bursaria (9.3%), cyst of cestode (6%), Oocyst protozoa (16%), Euglena gracilis (10.6%).were isolated. The study's goal was to isolate some of the parasites that pollute the Euphrat
... Show MoreImage recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third
... Show MoreSocial Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show MoreIn this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
Cognitive radios have the potential to greatly improve spectral efficiency in wireless networks. Cognitive radios are considered lower priority or secondary users of spectrum allocated to a primary user. Their fundamental requirement is to avoid interference to potential primary users in their vicinity. Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. In addition, reliable sensing creates spectrum opportunities for capacity increase of cognitive networks. One of the key challenges in spectrum sensing is the robust detection of primary signals in highly negative signal-to-noise regimes (SNR).In this paper ,
... Show MoreSignificant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing
... Show MorePredicting permeability is a cornerstone of petroleum reservoir engineering, playing a vital role in optimizing hydrocarbon recovery strategies. This paper explores the application of neural networks to predict permeability in oil reservoirs, underscoring their growing importance in addressing traditional prediction challenges. Conventional techniques often struggle with the complexities of subsurface conditions, making innovative approaches essential. Neural networks, with their ability to uncover complicated patterns within large datasets, emerge as a powerful alternative. The Quanti-Elan model was used in this study to combine several well logs for mineral volumes, porosity and water saturation estimation. This model goes be
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show More