Background: Ideal root canal obturation depends on many factors; one of them is good sealing of root canal without pores. The aim of this study was to determine the radiographic density of GuttaFlow® 2 with different obturation techniques using spiral computed tomography. Materials and Methods: Forty palatal roots of permanent maxillary first molar were used in this study. Following working length determination, root canal was prepared using rotary PROTAPER universal system. They were randomly divided into four groups of 10 roots each, the groups are Conventional lateral condensation with Apexit Plus sealer, Conventional lateral condensation with GuttaFlow® 2 as a sealer, Soft Core Regular with GuttaFlow® 2 as a sealer and single cone with GuttaFlow® 2. The experimental roots were then analyzed in both horizontal and vertical sections from the apex to coronal using Spiral Computed Tomography. The obtained data were analyzed using one-way ANOVA and Tukey tests at a level of significance of 0.05. Results: Statistical analysis showed highly significant differences among the different areas (apical, middle and coronal) of each group. The density of obturation systems decreased in the following sequence: single cone with GuttaFlow® 2 (highest density), Soft Core Regular, Conventional lateral condensation with GuttaFlow® 2 as a sealer and finally Conventional lateral condensation with Apexit Plus sealer (lowest density) Conclusion: None of the tested obturation techniques can achieve ideal three-dimensional dense obturation. Single cone with GuttaFlow® 2 shows the best results.
In this paper, a simulation of the electrical performance for Pentacene-based top-contact bottom-gate (TCBG) Organic Field-Effect Transistors (OFET) model with Polymethyl methacrylate (PMMA) and silicon nitride (Si3N4) as gate dielectrics was studied. The effects of gate dielectrics thickness on the device performance were investigated. The thickness of the two gate dielectric materials was in the range of 100-200nm to maintain a large current density and stable performance. MATLAB simulation demonstrated for model simulation results in terms of output and transfer characteristics for drain current and the transconductance. The layer thickness of 200nm may result in gate leakage current points to the requirement of optimizing the t
... Show MoreA new Schiff base [1-((2-(1H-indol-3-yl)ethylimino)methyl)naphthalene-2-ol] (HL) has been synthesized by condensing (2-hydroxy-1-naphthaldehyde) with (2-(1H-indol-3-yl)ethylamine). In turn, its transition metal complexes were prepared having the general formula; [Pt(IV)Cl2(L)2], [Re(V)Cl2(L)2]Cl and [Pd(L)2], 2K[M(II)Cl2(L)2] where M(II) = Co, Ni, Cu] are reported. Ligand as well as metal complexes are characterized by spectroscopic techniques such as FT-IR, UV-visible, 13C & 1H NMR, mass, elemental analysis. The results suggested that the ligand behaves like a bidentate ligand for all the synthesized complexes. On the other hand, theoretical studies of the ligand as well its metal complexes were conducted at gas phase using Hyp
... Show MoreThe two-neutron halo-nuclei (17B, 11Li, 8He) was investigated using a two-body nucleon density distribution (2BNDD) with two frequency shell model (TFSM). The structure of valence two-neutron of 17B nucleus in a pure (1d5/2) state and in a pure (1p1/2) state for 11L and 8He nuclei. For our tested nucleus, an efficient (2BNDD's) operator for point nucleon system folded with two-body correlation operator's functions was used to investigate nuclear matter density distributions, root-mean square (rms) radii, and elastic electron scattering form factors. In the nucleon-nucleon forces the correlation took account of
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe current study aims to apply the methods of evaluating investment decisions to extract the highest value and reduce the economic and environmental costs of the health sector according to the strategy.In order to achieve the objectives of the study, the researcher relied on the deductive approach in the theoretical aspect by collecting sources and previous studies. He also used the applied practical approach, relying on the data and reports of Amir almuminin Hospital for the period (2017-2031) for the purpose of evaluating investment decisions in the hospital. A set of conclusions, the most important of which is: The failure to apply
... Show MoreObjective: to assess the predictive value of Doppler imaging of the uterine artery in the identification of early intrauterine abnormal pregnancy as compared to a normal intrauterine pregnancy. Subjects and methods: one hundred and twenty pregnant ladies, at their 6-12 weeks of gestation, with a singleton pregnancy were included in this population-based case-control study. Thirty women with a missed miscarriage, 30 with hydatidiform mole, 30 with a blighted ovum, and 30 as a control group, without risk factors, underwent Doppler interrogation of the uterine arteries. Resistive index (RI), pulsatility index (PI), and the systolic/diastolic ratio (S/D) were measured for both sides. The t-test, or ANOVA test when appropriate, was
... Show MoreResearchers need to understand the differences between parametric and nonparametric regression models and how they work with available information about the relationship between response and explanatory variables and the distribution of random errors. This paper proposes a new nonparametric regression function for the kernel and employs it with the Nadaraya-Watson kernel estimator method and the Gaussian kernel function. The proposed kernel function (AMS) is then compared to the Gaussian kernel and the traditional parametric method, the ordinary least squares method (OLS). The objective of this study is to examine the effectiveness of nonparametric regression and identify the best-performing model when employing the Nadaraya-Watson
... Show MoreObjective: to assess the predictive value of Doppler imaging of the uterine artery in the identification of early intrauterine abnormal pregnancy as compared to a normal intrauterine pregnancy.
Subjects and methods: one hundred and twenty pregnant ladies, at their 6-12 weeks of gestation, with a singleton pregnancy were included in this population-based case-control study. Thirty women with a missed miscarriage, 30 with hydatidiform mole, 30 with a blighted ovum, and 30 as a control group, without risk factors, underwent Doppler interrogation of the uterine arteries. Resistive index (RI), pulsatility index (PI), and the systolic/diastolic ratio (S/D) were measured for both sides. The t-test, or ANOVA test when a
... Show MoreAn evaluation the performance of the irrigation system for the Al-Ishaqi irrigation project for the Eastern Canal was conducted to identify management strategies that can be used to improve the operation and performance of the irrigation system. The study area is located in Salah al-Din G.0overnorate, Iraq. The field work included determining the moisture content of the soil before and after irrigation, measuring the inflow of the field to find the depth of the applied water, field monitoring, and measuring the depth of the root zone for each irrigation process. Field measurements showed that the average efficiency of water application for the two fields (A, and B) are 59.81% and 38.6%, respectively. The results of the efficiency of
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show More