This study evaluated the extent to which obturation materials bypass fractured endodontic instruments positioned in the middle and apical thirds of severely curved simulated root canals using different obturation techniques. Sixty resin blocks with simulated root canals were used, each with a 50° curvature, a 6.5 mm radius of curvature, and a length of 16.5 mm, prepared to an ISO #15 diameter and taper. Canals were shaped using ProTaper Universal files (Dentsply Maillefer) attached to an X-smart Plus endo motor (Dentsply), set at 3.5 Ncm torque and 250 rpm, up to size S2 at working length. To simulate fractures, F2 and F3 files were weakened 3 mm from the tip, then twisted to break in the apical and middle sections of the canal, respectively. All samples were sealed with GuttaFlow 2 and divided into three groups (n = 20/group) according to obturation technique: A) single cone, B) lateral condensation with a rotary spreader, and C) softcore obturators. Each group was then divided into two subgroups (n = 10) based on the instrument fracture location (1 = apical, 2 = middle). The linear intrusion of obturation materials through the fractured instruments was measured using ImageJ software and analyzed statistically with ANOVA, Tukey tests, and independent t-tests, with significance set at p<0.05. Material bypass in group B1 (3.27 ± 0.63 mm) was significantly greater than in group A1 (2.39 ± 0.44 mm) and group C1 (2.91 ± 0.77 mm). In group C2, bypass (5.76 ± 0.64 mm) was significantly higher than in group A2 (3.82 ± 0.2 mm) and group B2 (2.27 ± 0.96 mm). Additionally, bypass in group A2 was greater than in group B2, and group B1 had more bypass than B2, while group C2 exceeded C1. The lateral condensation technique with a rotary spreader and softcore obturators increased the bypass of obturation materials through fractured instruments in simulated curved canals. These techniques may thus enhance material flow in endodontic procedures involving instrument fractures.
In this paper we estimate the coefficients and scale parameter in linear regression model depending on the residuals are of type 1 of extreme value distribution for the largest values . This can be regard as an improvement for the studies with the smallest values . We study two estimation methods ( OLS & MLE ) where we resort to Newton – Raphson (NR) and Fisher Scoring methods to get MLE estimate because the difficulty of using the usual approach with MLE . The relative efficiency criterion is considered beside to the statistical inference procedures for the extreme value regression model of type 1 for largest values . Confidence interval , hypothesis testing for both scale parameter and regression coefficients
... Show MoreCR-39 is a solid state nuclear track detector (SSNTD) that has been used in many research areas. In spite of the assumption that the CR-39 detectors are insensitive to beta and gamma rays, irradiation with these rays can have significant effects on the detector properties. In this study, beta and gamma rays mass attenuation coefficients μ/ρ (cm2 g-1) for the CR-39 detector have been measured using NaI(Tl) scintillation spectrometer along with a standard geometrical arrangement in the energy region of (0.546-2.274) MeV beta rays and standard gamma sources having energy 0.356, 0.5697, 0.6617 and 1.063 MeV. The total atomic cross-section (σtot), total electronic cross-section (σT E) and the effective atomic number (Zeff) of gamma rays a
... Show MoreThe soap content in biodiesel is an important challenge during the production and purification processing of biodiesel. Natural deep eutectic solvents (NADES) have recently attracted considerable interest as an environmentally suitable substitute for traditional solvents in the biodiesel industry. This work investigates the soap removal from the contaminated biodiesel using NADES. Eight choline chloride‐based deep eutectic solvents (DESs) were screened using the conductor‐like screening model for real solvents (COSMO‐RS) to identify the most suitable solvent for soap removal and were validated experimentally. The effect of NADES molar ratio, NADES:biodiesel ratio, mixing speed and extraction ti
Industrial development has recently increased, including that of plastic industries. Since plastic has a very long analytical life, it will cause environmental pollution, so studies have resorted to reusing recycled waste plastic (sustainable plastic) to produce environmentally friendly concrete (green concrete). In this research, producing environmentally friendly load-bearing concrete masonry units (blocks) was considered where five concrete mixtures were compressed at the blocks producing machine. The cement content reduced from 400 kg/m3 (B-400) to 300 kg/m3 (B-300) then to 200 kg/m3 (B-200). While (B-380) was produced using 380 kg/m3 cement and 20 kg/m3 nano-sil
... Show MoreIn this study, several ionanofluids (INFs) were prepared in order to study their efficiency as a cooling medium at 25 °C. The two-step technique is used to prepare ionanofluid (INF) by dispersing multi-walled carbon nanotubes (MWCNTs) in two concentrations 0.5 and 1 wt% in ionic liquid (IL). Two types of ionic liquids (ILs) were used: hydrophilic represented by 1-ethyl-3-methylimidazolium tetrafluoroborate [EMIM][BF4] and hydrophobic represented by 1-hexyl-3-methylimidazolium hexafluorophosphate [HMIM][PF6]. The thermophysical properties of the prepared INFs including thermal conductivity (TC), density and viscosity were measured experimental
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More