This study evaluated the extent to which obturation materials bypass fractured endodontic instruments positioned in the middle and apical thirds of severely curved simulated root canals using different obturation techniques. Sixty resin blocks with simulated root canals were used, each with a 50° curvature, a 6.5 mm radius of curvature, and a length of 16.5 mm, prepared to an ISO #15 diameter and taper. Canals were shaped using ProTaper Universal files (Dentsply Maillefer) attached to an X-smart Plus endo motor (Dentsply), set at 3.5 Ncm torque and 250 rpm, up to size S2 at working length. To simulate fractures, F2 and F3 files were weakened 3 mm from the tip, then twisted to break in the apical and middle sections of the canal, respectively. All samples were sealed with GuttaFlow 2 and divided into three groups (n = 20/group) according to obturation technique: A) single cone, B) lateral condensation with a rotary spreader, and C) softcore obturators. Each group was then divided into two subgroups (n = 10) based on the instrument fracture location (1 = apical, 2 = middle). The linear intrusion of obturation materials through the fractured instruments was measured using ImageJ software and analyzed statistically with ANOVA, Tukey tests, and independent t-tests, with significance set at p<0.05. Material bypass in group B1 (3.27 ± 0.63 mm) was significantly greater than in group A1 (2.39 ± 0.44 mm) and group C1 (2.91 ± 0.77 mm). In group C2, bypass (5.76 ± 0.64 mm) was significantly higher than in group A2 (3.82 ± 0.2 mm) and group B2 (2.27 ± 0.96 mm). Additionally, bypass in group A2 was greater than in group B2, and group B1 had more bypass than B2, while group C2 exceeded C1. The lateral condensation technique with a rotary spreader and softcore obturators increased the bypass of obturation materials through fractured instruments in simulated curved canals. These techniques may thus enhance material flow in endodontic procedures involving instrument fractures.
The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreThis study was conducted for evaluating the cytotoxic effect of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli on the proliferation of primary cancer cell cultures, obtained from tumor samples that were collected from (13) cancer patients and as follows: (five colon cancer patients, two bladder cancer patients, two breast cancer patients, two stomach cancer patients and two lung cancer patients), and on normal cell line (rat embryonic fibroblast / REF) (in vitro) with the use of different concentrations starting from (1) mg/ml and ending with (0.0002) mg/ml by making two fold serial dilutions by using the 96- well microtiter plate, and in comparison with negative (PBS) and positive (MMC, at concentration
... Show MoreBackground: Common and persistent isolate ina the teeth following failed therapy of the root canal is the gram-positive facultative bacterium Enterococcus faecalis and Escherichia coli, which develop biofilm through a complicated process that results in the formation of a biofilm. Enterococcus faecalis and Escherichia coli are significant factors that cause chronic periradicular lesions after root canal therapy. Aim: This study aimed to treat the root canal tooth infected with Escherichia coli and Enterococcus faecalis Methods: In this study biofilm formation was done for Escherichia coli in growth phase cultured in a brain heart broth Enterococcus faecalis and Escherichia coli cultured in Luria-Bertani (LB) infusion medium for 18 hrs. Then
... Show MoreStealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the
... Show MoreBackground: Nanotechnology represents a new science that promises to provide a broad range of uses and improved technologies for biological and biomedical applications. One of the reasons behind the intense interest is that nanotechnology permits synthesis of materials that have structure is less than 100 nanometers. The present work revealed the effect of zinc oxide nanoparticles (ZnO NPs) on Streptococcus mutans of Human Saliva in comparison to de-ionized water. Materials and methods: Streptococcus mutans were isolated from saliva of forty eight volunteers of both sexes their age range between 18-22 years and then purified and diagnosed according to morphological characteristic and biochemical tests. Different concentrations of ZnO NPs w
... Show MoreThis paper deals with numerical study of the flow of stable and fluid Allamstqr Aniotina in an area surrounded by a right-angled triangle has touched particularly valuable secondary flow cross section resulting from the pressure gradient In the first case was analyzed stable flow where he found that the equations of motion that describe the movement of the fluid
الناصر، عامر عبد الرزاق عبد المحسن والكبيسي، صلاح الدين عواد كريم. 2018. إمكانية تبني الحوسبة السحابية الهجينة في الجامعات العراقية : دراسة تحليلية باستخدام أنموذج القبول التكنولوجي. مجلة الإدا
This research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More