Background: The main aim of the present study is to qualify and quantify voids formation of root canals obturated with GuttaCore (GC) and experimental Hydroxyapatite polyethylene (HA/PE) as new carrier-based root canal fillings by using micro computed tomography scan. Materials and methods: In the present study, eight straight single-rooted human permanent premolar teeth are selected and disinfected, then stored in distilled water. The teeth decoronated leaving a root length of 12mm each. The root canals instrumented by using crown down technique and the apical diameter of the root canal prepared to a size # 30/0.04 for achieving standardized measurements. A 5mL of 17% EDTA used to remove the smear layer followed by 5mL of 2.5% NaOCl and rinsing with normal saline. Then the shaped root canals were randomly subdivided into two groups of 4 teeth each according to the carrier-based obturation system use, GuttaCore or experimental HA/PE. Afterwards, the obturated roots stored at 37°C with 100% humidity for 72 hours to allow for complete setting of the sealer. Micro-CT was then scanned to quantify the voids within the root canal space. The data were statistically analyzed by one-way ANOVA and post hoc comparison tests (α=0.05). Results: The root canals obturated with both obturation systems, GuttaCore andexperimental HA/PE showed voids formation, particularly at the apical third of the root canal. GC obturation showed a lower percentage of voids volume (1.54%) than the experimental HA/PE obturation (2.3%). The void volume percentage in the GuttaCore system, however, was non-significantly different (P> 0.05) in comparison with the experimental PE/HA system. Conclusions: GuttaCore and experimental HA/PE obturators exhibited voids formation within the entire root canal space. The experimental HA/PE obturator is comparable to the GuttaCore obturator in terms of voids qualification
This study was carried out to investigate the cytogenetic effects of crude aqueous extract of Lycium barbarum on the roots tip of Allium cepa Using three concentration 125, 25, 50 mg/ ml for 2, 4, 6 hours treatment periods.This study were included some cytogenetic analysis such as mitotic index , phase index and chromosome aberration. The data showed that the treatment with 50mg/ml for 6huors led to reduce the mitotic index less than 50% . This reduction considered to have toxic and sublethal effect . These results revealed mutagenic potency by inducing differents type of chromosome aberration.
Background: Little is known about asymmetry of children's dental arches, the purpose of this study was to verify the presence of asymmetry of dental arches among Iraqi children in the mixed dentition stage. Materials and methods: The sample included 52 pairs of dental casts, 27 pairs belong to males and 25 pairs for females. Three linear distances were utilized on each side on the dental arch: Incisal-canine distance, canine-molar distance and incisal-molar distance, which represent the dental arch segmental measurements using the digital sliding calipers, which is accurate up to 0.02 mm. Results: No significant sides' differences with high correlation coefficient were found between the right and left incisal-canine, canine-molar and in
... Show MoreEffect of nano and micro SiO2 particles with different weight percent (2,4,6,8 and 10) %wt on the Interlaminar fracture toughness (GIc) of 16-plies of woven roving glass fiber /epoxy composites prepared by hand lay – up technique were investigated. The specimens were tested using DCB test (mode I).
Area method was used to compute the interlaminar fracture toughness. The results show that, GIc would increase with the increasing in the filler content, the main failure in microcomposites and nanocomposites was delamination in the layers, the delamination reduced with increasing in the filler content.
The study aims to use the European Excellence Model (EFQM) in assessing the institutional performance of the National Center for Administrative Development and Information Technology in order to determine the gap between the actual reality of the performance of the Center and the standards adopted in the model, in order to know the extent to which the Center seeks to achieve excellence in performance to improve the level of services provided and the adoption of methods Modern and contemporary management in the evaluation of its institutional performance.
The problem of the study was the absence of an institutional performance evaluation system at the centre whereby weaknesses (areas of improvement) and st
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreVisible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More