Background: The use of electronic apex locators for working length determination eliminates many of the problems associated with the radiographic measurements (interference of anatomical structures, errors in projection such as elongation or shortening, and lack of three-dimensional representation). Its most important advantage over radiography is that it measures the length of the root canal to the apical constriction, not to the radiographic apex. The aim of this study was to assess the accuracy of a new fifth generation apex locator (Joypex 5) in recording the apical constriction and comparing it with a third generation apex locator (Root ZX) in vitro. Materials and method: Twenty four single-rooted sound human premolars, extracted for the purpose of orthodontic treatment and with fully-formed roots, were used in this study. Endodontic access cavity was prepared in each tooth and canal patency up to the apical foramen was checked with a #15 stainless steel K-file. No root canal preparation was performed. Root canal length measurement was done directly and electronically using two apex locators (Joypex 5 and Root ZX). Direct measurement of the root canal length was done by introducing a #15 K-file inside the root canal until its tip was just visible at the apical foramen, then removed from the root canal and its length was measured (in mm) and subtracted by 0.5 mm. For electronic measurement, the teeth were fixed in a sponge soaked in saline and the root canals were also filled with saline. The lip electrode was attached to the sponge and the apex locators were used according to the manufacturers' instructions. The file holder was clipped to the metal shaft of a #15 K-file and the file was then inserted inside the root canal and advanced until the display reading on the LCD of the apex locator was "0.5". The file was then removed from the root canal and its length was measured (in mm). The differences between the readings of each apex locator and the actual length of each canal were computed, and the results were analyzed statistically by paired t-test using SPSS Version 13. Results: The results of this study showed that the Joypex 5 apex locator showed a lower mean difference than the Root ZX apex locator as compared with the actual length, which was statistically significant (p<0.05). Concerning the accuracy of the two apex locators, Joypex 5 apex locator recorded the apical constriction exactly in 67%, while the Root ZX apex locator in only 25%. Within ±0.5 mm from the actual length, the accuracy of the Joypex 5 and the Root ZX were 83% and 67%, respectively. Within ±1 mm from the actual length, the accuracy of the Joypex 5 and the Root ZX were 100% and 96%, respectively. Conclusion: The Joypex 5 apex locator which is a fifth generation apex locator was more accurate in recording the apical constriction as compared with the Root ZX apex locator which is a third generation apex locator.
In this work, the possibility of utilizing osmosis phenomenon to produce energy as a type of the renewable energy using Thin Film Composite Ultra Low Pressure membrane TFC-ULP was studied. Where by forward osmosis water passes through the membrane toward the concentrated brine solution, this will lead to raise the head of the high brine solution. This developed static head may be used to produce energy. The aim of the present work is to study the static head developed and the flux on the high brine water solution side when using forward and reverse osmosis membranes for an initial concentration range from 35-300 g/l for each type of membrane used at room temperature and pressure conditions, and finally calculating the maximum possible po
... Show MoreAn approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis research deals with the hadiths of intimidation. An analytical study of the serious effects of intimidation in society. Intimidation and intimidation of a Muslim is a serious matter, because of the anxiety, intimidation, and dispossession of others ’rights, but some consider it easy, and others intimidate jokingly or seriously, which may lead to such intimidation to have effects Serious.
For intimidation entails the death of the individual, the disappearance of his mind, or the loss of his money, etc., from here the need was urgent; to show the vision of the prophetic Sunnah in denouncing intimidation, so we had this humble research tagged with (hadiths prohibiting the intimidation of a Muslim in the books The six are an analyt
Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle
... Show MoreApical periodontitis (AP) is the most prevalent chronic inflammatory disease of the teeth. Bone resorption dynamics in symptomatic and asymptomatic AP are still unrecognized. This study examined different inflammatory markers within gingival crevicular fluid, including matrix metalloproteinases 8 (MMP8), tissue inhibitors of metalloproteinases 1 (TIMP1), receptor activator of nuclear factor κB (RANK), its ligand (RANKL), and osteoprotegerin (OPG), to be used in comparing symptomatic apical periodontitis (SAP) and asymptomatic apical periodontitis (AAP) versus healthy teeth. Subjects with SAP, AAP, and a control group were recruited and GCF samples were collected by Periopaper strips. Clinical and radiographical measures were used f
... Show MoreThis research paper studies the alienation of the intellectuals in the modern novel through the study of two alienated characters, John Marcher in Henry James's The Beast in the Jungle, and Mr. Duffy in James's Joyce's "A Painful Case." As a result of the complexity of life in the industrial societies, the individuals, especially the intellectual ones, feel themselves unable to integrate into social life; they fear society and feel that it endangers their individuality and independence. Thus, these characters live on the fringe of the societ
... Show More