The goals of endodontic preparation were to shape and clean the space of the root canal and remove microorganisms, affected dentin and pulp, the apical foramen and the canal curve should be protected from being transported during endodontic canal preparation. The aim of this study was to evaluate the curve straightening of curved root canals and apical transportation after preparation with four rotary systems. Forty mesial roots of the lower 1st molars teeth only the mesiobuccal canals were used, these roots were immersed into cold clear acrylic , the teeth roots divided into four groups according to rotary system used for preparation of the canals (ten roots for each group):. group I: ProTaper Next rotary system, group II: IRaCe Plus rotary system, group III: HeroShaper rotary system, group IV: ProTaper rotary system, instrumentation were done to size 30 master apical file and with copious irrigation, total amount of 10 ml of 2.5% of sodium hypochlorite (NaOCl) then rinsed the canals with distilled water 5 ml. radiograph was taken for all roots before and after instrumentation in one direction buccolingual using digital radiograph system. The degree of curve straightening of the root canal and the apical transportation were measured using Image J software and Adobe photoshop CS6 software. Statistical analysis was done and the result showed that group IV had the highest mean values in curve straightening and apical transportation, there were significant difference between group IV and all of the other groups and there were non- significant difference between group I , group II and group . All the four used rotary systems produced adequate geometry during canal preparations. However, some apical transportation in ProTaper group was seen, which might need a caution when used protaper in instrumentation of curved canal.
In this paper, we proved that if R is a prime ring, U be a nonzero Lie ideal of R , d be a nonzero (?,?)-derivation of R. Then if Ua?Z(R) (or aU?Z(R)) for a?R, then either or U is commutative Also, we assumed that Uis a ring to prove that: (i) If Ua?Z(R) (or aU?Z(R)) for a?R, then either a=0 or U is commutative. (ii) If ad(U)=0 (or d(U)a=0) for a?R, then either a=0 or U is commutative. (iii) If d is a homomorphism on U such that ad(U) ?Z(R)(or d(U)a?Z(R), then a=0 or U is commutative.
Background and Objectives: Urinary tract infections (UTIs), among a wide range of microbial infections, are of a double-edged worry with health-care and economic implications. They are serious diseases that can influence various parts of the urinary tract. The aim of this study was characterization of the enteric bacteria isolated from urine of human UTIs and studying their antimicrobial sensitivity. Materials and methods: A total of 50 urine samples were collected from patients with UTIs of both genders. The isolates identification was done using routine diagnostic methods and confirmed by Vitek2. Antimicrobial susceptibility was done against 10 antimicrobials. Results: Both genders of human were found to suffer from urinary tract problems
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreComplement activation leads to membrane attack complex formation, which can lyse not only pathogens but also host cells. Histones can be released from the lysed or damaged cells and serve as a major type of damage-associated molecular pattern, but their effects on the complement system are not clear. In this study, we pulled down two major proteins from human serum using histone-conjugated beads: one was C-reactive protein and the other was C4, as identified by mass spectrometry. In surface plasmon resonance analysis, histone H3 and H4 showed stronger binding to C4 than other histones, with KD around 1 nM. The interaction did not affect C4 cleavage to C4a and C4b. Because histones bin
In this study, we introduce new a nanocomposite of functionalize graphene oxide FGO and functionalize multi wall carbon nanotube (F-MWCNT-FGO).The formation of nanocomposite was confirmed by FT-IR ,XRD and SEM. The magnitude of the dielectric permittivity of the (F-MWCNT-FGO) nanocomposite appears to be very high in the low frequency range and show a unique negative permittivity at frequencies range from 400 Hz to 4000Hz. The ac conductivity of nanocomposite reaches 23.8 S.m-1 at 100Hz.
The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show More