Background: Removal of bacteria from the pulp system by instrumentation of an infected root canal, will be significantly reduced the number of bacteria, but it is well documented that instrumentation alone can-not clean and kill all bacteria found on the root canal walls. Antibacterial irrigants are needed to kill the remaining microorganisms. The aims of this study was to assess antibacterial effect of titanium tetrafluoride (TiF4) solution and brewing green tea against root canal bacteria and to compare with sodium hypochlorite and normal saline through microbiological and molecular studies. Materials and methods: Microbiological study was carried out to determine the concentration of titanium tetrafluoride and brewing green tea at which they exert antibacterial effect against ten swabs that had been taken from necrotic root canals that were incubated aerobically and anaerobically by paper disk diffusion test, whilemolecular study carried out among Forty children in which the antibacterial effect of titanium tetrafluoride and brewing green tea compared with sodium hypochlorite and normal saline were assessed by real time polymerase chain reaction using SYBR Green. Results: The microbiological study results showed that TiF4 achieved maximum antibacterial effect at concentration 5% against aerobic and anaerobic bacteria while green tea exhibited antibacterial effect when brewed for 20 minutes at concentration 100mg/1ml against staphylococcus aureus, but not active against other microorganisms like Escherichia coli and streptococcus. While results of molecular study illustrated that sodium hypochlorite remained the most effective endodontic irrigant solutions followed by titanium tetrafluoride then green tea while normal saline showed no antibacterial effect. Statistically titanium tetrafluoride, green tea and sodium hypochlorite have significant differences compared to normal saline. Conclusions: This study revealed that, titanium tetra fluoride and brewing green tea can be used as antibacterial irrigant solutions for root canal treatment in children.
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreAn approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in
... Show MoreOver the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time. In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D
... Show MoreThis dissertation depends on study of the topological structure in graph theory as well as introduce some concerning concepts, and generalization them into new topological spaces constructed using elements of graph. Thus, it is required presenting some theorems, propositions, and corollaries that are available in resources and proof which are not available. Moreover, studying some relationships between many concepts and examining their equivalence property like locally connectedness, convexity, intervals, and compactness. In addition, introducing the concepts of weaker separation axioms in α-topological spaces than the standard once like, α-feebly Hausdorff, α-feebly regular, and α-feebly normal and studying their properties. Furthermor
... Show MoreThis investigation was carried out to study the treatment and recycling of wastewater in the cotton textile industry for an effluent containing three dyes: direct blue, sulphur black and vat yellow. The reuse of such effluent can only be made possible by appropriate treatment method such as chemical coagulation. Ferrous and ferric sulphate with and without calcium hydroxide were employed in this study as the chemical coagulants.
The results showed that the percentage removal of direct blue ranged between 91.4 and 94 , for sulphur black ranged between 98.7 and 99.5 while for vat yellow it was between 97 and 99.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show More