Background: Removal of bacteria from the pulp system by instrumentation of an infected root canal, will be significantly reduced the number of bacteria, but it is well documented that instrumentation alone can-not clean and kill all bacteria found on the root canal walls. Antibacterial irrigants are needed to kill the remaining microorganisms. The aims of this study was to assess antibacterial effect of titanium tetrafluoride (TiF4) solution and brewing green tea against root canal bacteria and to compare with sodium hypochlorite and normal saline through microbiological and molecular studies. Materials and methods: Microbiological study was carried out to determine the concentration of titanium tetrafluoride and brewing green tea at which they exert antibacterial effect against ten swabs that had been taken from necrotic root canals that were incubated aerobically and anaerobically by paper disk diffusion test, whilemolecular study carried out among Forty children in which the antibacterial effect of titanium tetrafluoride and brewing green tea compared with sodium hypochlorite and normal saline were assessed by real time polymerase chain reaction using SYBR Green. Results: The microbiological study results showed that TiF4 achieved maximum antibacterial effect at concentration 5% against aerobic and anaerobic bacteria while green tea exhibited antibacterial effect when brewed for 20 minutes at concentration 100mg/1ml against staphylococcus aureus, but not active against other microorganisms like Escherichia coli and streptococcus. While results of molecular study illustrated that sodium hypochlorite remained the most effective endodontic irrigant solutions followed by titanium tetrafluoride then green tea while normal saline showed no antibacterial effect. Statistically titanium tetrafluoride, green tea and sodium hypochlorite have significant differences compared to normal saline. Conclusions: This study revealed that, titanium tetra fluoride and brewing green tea can be used as antibacterial irrigant solutions for root canal treatment in children.
The rent is one of the sources of investment that generates returns for the owner of the housing unit, and it is also one of the importance expenditure for the tenant.
The importance of this research comes in addressing the deficiency in the field of analyzing the factors affecting the rental value of residential units, which affects many segments of the population of Baghdad.
The aim of this research is analyze and evaluate related variables on the rent value of residential units in neighbourhood 409 in city of BAGHDAD, which is a hypothesis that: There are a set of variables affecting the rental value, including those related to the internal environment of the dwelling, such as: income level, plot area, building area, n
... Show MoreSelf-compacted concrete (SCC) considered as a revolution progress in concrete technology due to its ability for flowing through forms, fusion with reinforcement, compact itself by its weight without using vibrators and economic advantages. This research aims to assess the fresh properties of SCC and study their effect on its compressive strength using different grading zones and different fineness modulus (F.M) of fine aggregate. The fineness modulus used in this study was (2.73, 2.82,2.9& 3.12) for different zones of grading (zone I, zone II& marginal zone(between zone I&II)) according to Iraqi standards (I.Q.S No.45/1984).Twelve mixes were prepared, each mix were tested in fresh state with slump, V-Funnel and L-Box tests, then 72
... Show MoreIn this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators