A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique, Omar Jihad Banawi*, Raghad
Chronic periodontitis (CP) is an inflammatory disease affecting tooth supporting structures in response to bacterial dental plaque causing irreversible tissue destruction. Cyclooxygenase-2 (COX-2) is an effective mediator in the pathogenesis of periodontitis. Polymorphisms in the COX-2 gene may contribute to its overexpression and increased disease susceptibility. To evaluate the association between -1195 A/G single nucleotide polymorphism (SNP) in the promotor area of the cyclooxygenase-2(COX-2) gene and severity of chronic periodontitis in a sample of Iraqi population. -1195A/ G COX-2 SNP was investigated in 70 chronic periodontitis (CP) cases and 30 healthy controls. CP cases composed of 2 subgroups (35 moderate CP cases and 35 severe CP
... Show MoreThe aim of this study is to investigate the kinetics of copper removal from aqueous solutions using an electromembrane extraction (EME) system. To achieve this, a unique electrochemical cell design was adopted comprising two glass chambers, a supported liquid membrane (SLM), a graphite anode, and a stainless-steel cathode. The SLM consisted of a polypropylene flat membrane infused with 1-octanol as a solvent and bis(2-ethylhexyl) phosphate (DEHP) as a carrier. The impact of various factors on the kinetics constant rate was outlined, including the applied voltage, initial pH of the donor phase solution, and initial copper concentration. The results demonstrated a significant influence of the applied voltage on enhancing the rate of c
... Show MoreBackground: techniques of image analysis have been used extensively to minimize interobserver variation of immunohistochemical scoring, yet; image acquisition procedures are often demanding, expensive and laborious. This study aims to assess the validity of image analysis to predict human observer’s score with a simplified image acquisition technique. Materials and methods: formalin fixed- paraffin embedded tissue sections for ameloblastomas and basal cell carcinomas were immunohistochemically stained with monoclonal antibodies to MMP-2 and MMP-9. The extent of antibody positivity was quantified using Imagej® based application on low power photomicrographs obtained with a conventional camera. Results of the software were employed
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreA fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreThere is a global shortage of health care providers needed to address all levels of primary and specialty care. The recent COVID-19 pandemic also highlights the importance and added value of health professionals with specialty training in infectious diseases. In the United States, advanced practice providers (APPs) are being engaged to meet the expanding demand for generalist and specialist patient care. The history and development of advanced practice registered nurses (APRNs) and physician assistants (PAs), are discussed as collaborative healthcare providers to promote better understanding of the ways they can be incorporated into a healthcare system. An example of how APPs are utilized to provide both inpatient and outpatient
... Show MoreThe aim of the research is to measure the length between the variable the efficiency of the tax examiner with its dimensions represented by (scientific questions, practical process (experience), training and development, impartiality and independence, ethics of the profession) and the approved variable discovering the artificial adaptation of profits, and the degree of arrangement of those dimensions its importance and priority, and the research problem has been identified In a main question that is there any effect of copying the images of the image examiner in discovering the adaptation, the financial statements and reports of the companies (X, Y) and the banks (A, B) were relied on in the interpretation of the results, t
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More