The success of endodontic therapy is relied on radicular system cleaning, shaping, elimination of micro-organisms, and three dimensional filling of the radicular complex.This study was conducted to develop and assess new root canal sealer incorporating nano-sized bioactive glass into Gutta Flow II. The following concentration was used depend on a pilot study included adding (3%) of 45S5 bioactive glass into the Gutta Flow II. These materials were tested through assessment bioactivity. bioactivity test was undertaken after immersion of the tested samples into PBS for three days, seven days, fourteen days, and twenty eight days using FTIR too. study was found that it’s peaks was appear at level 800-1000 cm-1. The results showed that GFII group revealed no peak at the 910 cm-1, while, while BG3% revealed 179.85 pixel height, in conclusion the newly developed sealers exhibited apparent apatite and apatite precursor forming ability significantly with BG 3% while GuttaFlow II sealer showed no apatite layer forming ability.
Doxycycline hyclate is an antibiotic drug with a broad‐spectrum activity against a variety of gram‐positive and gram‐negative bacteria and is frequently used as a pharmacological agent and as an effector molecule in an inducible gene expression system. A sensitive, reliable and fast spectrophotometric method for the determination of doxycycline hyclate in pure and pharmaceutical formulations has been developed using flow injection analysis (FIA) and batch procedures. The proposed method is based on the reaction between the chromogenic reagent (V4+) and doxycycline hyclate in a neutral medium, resulting in the formation of a yellow compound that shows maximum absorbance at 3
Fractal geometry is receiving increase attention as a quantitative and qualitative model for natural phenomena description, which can establish an active classification technique when applied on satellite images. In this paper, a satellite image is used which was taken by Quick Bird that contains different visible classes. After pre-processing, this image passes through two stages: segmentation and classification. The segmentation carried out by hybrid two methods used to produce effective results; the two methods are Quadtree method that operated inside Horizontal-Vertical method. The hybrid method is segmented the image into two rectangular blocks, either horizontally or vertically depending on spectral uniformity crit
... Show MoreBackground: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.
Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.
Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More