Background: The bond strength of the root canal sealers to dentin is very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate and compare the push-out bond strength of root filled with total fill Bioceramic, AH Plus and Gutta-flow®2 sealers using GuttaFusion®obturation system versus single cone obturation technique. Materials and method: sixty of mandibular premolars teeth with straight roots were used in this study, these roots were instrumented using Reciproc system, instrumentation were done with copious irrigation of 3 mL 5.25% sodium hypochlorite solution (NaOCl) during all the steps of preparation, and smear layer will be removed with 1 ml of 17% EDTA kept in the canal for 1 min, roots were randomly divided into two groups according to the obturation technique (thirty teeth for each group): Group I: Single Reciproc Gutta percha cone obturation technique, Group II: Gutta fusion obturation technique, then each group divided into three subgroup according to the type of sealer, AH subgroup: AH Plus sealer, BC subgroup: bioceramic sealer and GF subgroup: Gutta flow 2 sealer. The roots then stored in moist environment at 37°C for one week, the roots were embedded in clear acrylic resin and each root sectioned into three levels apical, middle and cervical. The bond strength was measured using computerized universal testing machine each section fixed in the machine so that the load applied from apical to cervical direction at 0.5mm/min. speed and the computer show the higher bond force before dislodgment of the filling material. These forces were divided by the surface area to obtain the bond strength in MPa. Results: Statistical analysis was performed and the result showed a highly significant differences between the three types of sealers when the same obturation technique were used, also there is highly significant differences between two groups with two different obturation technique. Conclusion: This study showed that the push out bond strength of AH plus sealer was higher than bioceramic sealer and Gutta flow 2 sealer respectively when the same obturation technique was used. The push out bond strength was affected by the obturation technique and Gutta fusion obturation technique showed higher bond strength than single cone obturation technique when the same type of sealer was used.
In this paper, the computational method (CM) based on the standard polynomials has been implemented to solve some nonlinear differential equations arising in engineering and applied sciences. Moreover, novel computational methods have been developed in this study by orthogonal base functions, namely Hermite, Legendre, and Bernstein polynomials. The nonlinear problem is successfully converted into a nonlinear algebraic system of equations, which are then solved by Mathematica®12. The developed computational methods (D-CMs) have been applied to solve three applications involving well-known nonlinear problems: the Darcy-Brinkman-Forchheimer equation, the Blasius equation, and the Falkner-Skan equation, and a comparison between t
... Show MoreIn this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using
The process involved isolating E. faecium from the gut of honeybees, screening the bacterium for bacteriocin-like inhibitory substance (BLIS), evaluating its impact on the expression of the mexA gene in multidrug-resistant (MDR) P. aeruginosa, and determining the role of bacteriocin in treating infected wounds in mice through histopathological examination. After evaluating the best circumstances for producing BLIS, it was discovered that glucose was a superior carbon source and yeast extract was the best source of nitrogen. The pH was found to be 5, the ideal incubation time was 72 hours, and ammonium sulfate salt was used for partial purification at 80% saturation. The identification of MDR P. aeruginosa isolates from pus infection
... Show MoreIn an intensive study of the various species of the Euglenophyceae under different environmental conditions, the algal samples were collected monthly in twelve springs and six related streams from September 2019 to August 2020 within Shaglawa district-Erbil Province in virgin areas for phycolimnological study. Twenty species of Euglenophyceaen are identified as a new record for the algal flora. These taxa consist of Colacium vesiculosum, Lepocinclis salina and L.wangi, Eutreptia viridis, Euglena chlamydophora, E. clavata,
... Show MoreBackground: lip lengthening procedure is one of the surgical options for the correction of gummy smile in patients with short upper lip. Methods: A comparative clinical study was conducted on 15 patients requiring lip lengthening procedure for the esthetic correction of excessive gingival exposure with gummy smile. Scalpel was used in seven patients and diode laser in the remaining eight patients. Under infiltration anesthesia, about one cm strip of mucosa was excised at the vestibular depth and the mucosa of the lip was sutured to the alveolar mucosa. Results: The diode laser group demonstrated less postoperative pain and swelling. Regarding postoperative ecchymosis, three patients in the scalpel group developed ecchymosis and no cases
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More