The success of endodontic therapy is relied on radicular system cleaning, shaping, elimination of micro-organisms, and three dimensional filling of the radicular complex.This study was conducted to develop and assess new root canal sealer incorporating nano-sized bioactive glass into Gutta Flow II. The following concentration was used depend on a pilot study included adding (3%) of 45S5 bioactive glass into the Gutta Flow II. These materials were tested through assessment bioactivity. bioactivity test was undertaken after immersion of the tested samples into PBS for three days, seven days, fourteen days, and twenty eight days using FTIR too. study was found that it’s peaks was appear at level 800-1000 cm-1. The results showed that GFII gr
... Show MoreBackground: Color stability of glass ionomers (GIs) could be affected by many factors such as pH and consumption of liquid medications like antibiotics. Most common antibiotics used during childhood are amoxicillin suspension (AM.S) and azithromycin suspension (AZ.S) which have acidic and basic pH respectively. Aim: to evaluate and compare the effect of AM.S and AZ.S on color stability of nano resin-modified GI. Methods: Thirty disc of nano resin-modified glass ionomer (2mm height x 4mm diameter) were divided into three groups (n=10 for each) and independently exposed to AM.S, AZ.S, and artificial saliva (A.S.). Color stability was evaluated in triplicate by VITA Easyshade® before and after three immersion protocols, repeated over a thr
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis study deals with the intellectual representations whose intellectual systems are incarnated in the Jewish personality, which is considered one of the complex intellectual systems that has caused controversy throughout the ages because of the ambiguity due to the religious and psychological factors that were reflected directly and strongly on the intellectual structure of the Jewish community in general and the Jewish - Zionist personality in particular, in an attempt (to create new dimensions embodied by intellectual representations of a human nature embodied by what that - peaceful - religiously oppressed - psychologically and socially isolated character presents, because of the curse of the peoples of the world that was a cause fo
... Show More