Background: The fracture of instruments within root canal during endodontic treatment is a common incidence, fracture because of fatigue through flexure occurs due to metal fatigue, this study aimed to assess the effect of curvature angle and rotational speed on the cyclic fatigue of different type of Endodontic NiTi Rotary Instruments and compare among them. Materials and method: Three types of rotary instruments with tip size 0.25: ProTaPer F2 (Densply, Malifier) Revo-S SU( 0.06 taper, MicroMega) and RaCe system (0.06 taper, FKG, Dentaire), Forty file of each instrument were used within two canals with angle of curvature (40 &60 )at two speed (250&400)RPM, twelve group were formed for all instruments(total number=120),ten file for each group. The testing canals customized within stainless steel block covered with glass face, the time to fracture recorded and the mean of cycles to fracture (MCF) detected for each instrument. Data were analyzed statistically by ANOVA, LSD and Independent T-test at 5% significant level. Result: there was a highly significant difference of curvature angle and significant difference of rotational speed on the fracture resistance of instruments. RaCe revealed the best fracture resistance followed by ProTaper then Revo-S that showed the less resistance. Conclusion: The rotary instruments more prone to fracture when used at more curvature angle and higher rotational speed, as well as the rotary instruments differ from each other according to manufacturing process, taper, cross section and other factors.
Nonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.
We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull bas
Introduction: Cerebral hydatid disease (CHD) is rare and the multiple-cystic variety is even rarer. In this paper, we report a case of multiple CHD and explore a possible link with a preceding spontaneous intracerebral haemorrhage (ICH). Case presentation: A 27-year old gentleman with a history of surgically-evacuated, spontaneous ICH presented with severe headache, left-sided weakness - Medical Research Council (MRC) grade II - and recurrent tonic-clonic seizures, while on a full dose of anti-epileptic medication. Brain magnetic resonance imaging (MRI) scans showed multiple intra-axial cystic lesions in the right hemisphere. The cysts were removed intact using Dowling’s technique through a large temporoparietal crani
... Show MoreTo ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreThe recurrent somatic variations in
The aim of the study was to detect the frequency of R132 mutations in the
Many therapeutic methods used to encourage reparative processes of cartilage and accelerate their healing such as drugs, magneto-laser and so on. Twenty four adult New Zealand rabbits used in this study. They were divided in to two groups; control and treaded with He –Ne laser. A square skin flap done on the medial aspect of both auricles followed by pealing a square piece of cartilage from the auricle then the flaps sutured .The site of the operation in the rabbits of the treated group were irradiated with He –Ne laser 5mw power for seven days began after the operation directly. 3 rabbits from each group used for collection of specimens for histopathological examination at the 1, 2, 4 & 6 weeks post the operation. Significant
... Show MoreBackground :Thalassemia is an autosomal
disease of the haemoglobin. Two types of
thalassemia are recognized: thalassemia major
and thalassemia intermedia.
The most serious cardiac complication in
thalassemia major is due to multiple blood
transfusions rather than the disease itself, which
is due to iron overload.
Cardiomyopathy is the most common cardiac
defect that occurs with iron overload. Pricarditis,
congestive heart failure and arrhythmias are due
to hemosidrosis and chronic aneamia.
Aim of the study: to demonstrate the prevalence
and types of electrocardiographic changes among
thalassemic patients with aged over ten years old.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More