Objective: This in vitro study is aimed to compare and evaluate the cyclic fatigue of four varying NiTi rotary instrumentation systems. Method: In this study, four types of rotary files were used in four groups (10 files for each group), namely, Group A: Wave One Gold; Group B: AF Blue R3; Group C: One Curve; Group D: F6 SkyTaper. These groups were evaluated by a cyclic fatigue apparatus to measure cyclic fatigue resistance within the artificial metallic simulating canal that has a 60 angle of curvature, the curvature radius was 5 mm, whereas the inner diameter of the canal was 1.5 mm. All the files were rotated in artificial canals until they fracture. The resistance to cyclic fatigue was determined by counting the number of cycles to frac
... Show MoreThe ligand 2-Hydroxy-N-pyridin-2-ylmethyl-acetamide(L) has been prepared from reaction of 2-(aminomethyl)pyridin with chloroacetic acid (1:1).It has been characterized by elemental analysis (C,H,N) ,'H, 13 C-NMR, IR and electronic spectra. The complexes of divalent (Co,Ni,Cu,Zn,Cd and Hg) ions and trivalent(Cr) ion have been synthesized and characterized by IR, electronic spectra, molar conductivity, atomic absorption and molar ratio (Ni 2+) complex. The analytical studies for the complexes show; octahedral for (Cr 3+),square planar for (Cu 2+) and (Co,Ni Zn, Cd and Hg) tetrahedral geometries. The study of biological activity of the ligand (L) and its complexes (Co,Ni,Cu,Cd,Hg) in two deferent concentration (1and5) mg/ml showed various acti
... Show MoreGraphene oxide GO was functionalized with 4-amino, 3-substituted 1H, 1, 2, 4 Triazole 5(4H) thion (ASTT) to obtain GOT. GOT characterized by FT-IR, XRD.via modification of the working electrode of the SPCE with the prepared nanomaterial (GOT) the effect of scan rate and pH on the determination of Amoxilline (AMOX) was studied using cyclic voltammetry. AMOX show various responses at pH ranging from 2 to 7 and also was observed sharp increase in the oxidation peaks in the pH 3. The formal potential (midpoint) for AMOX was highly pH-dependent. From the effect of scan rate, surface coverage concentration Γ of electroactive species the values of the electron transfer coefficient and the electron transfer constant rate ket was obtained as 5.39×
... Show MoreThe rise of antibiotic-resistant bacteria necessitates the exploration of novel antimicrobial agents. Yttrium oxide nanoparticles (Y₂O₃) have shown potential due to their unique physicochemical properties and antibacterial activities against various pathogens. This study investigates the cytotoxic and antibacterial effects of Y₂O₃ nanoparticles against Serratia fonticuli and Citrobacter koseri, bacteria isolated from cholangitis patients. Bacterial strains were isolated from bile specimens and confirmed using standard microbiological techniques. The methods of X-ray diffraction (XRD), (SEM), and Frequency transform-infrared spectroscopic (FT-IR) were used to characterize YO₃ particles. Using a microdilution technique, the minimum
... Show MoreBackground The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More