Background: Complete seal of the root canal system following its chemo-mechanical debridement plays a pivotal role for achieving successful endodontic treatment. This can be established by reducing the gaps between the core filling material and root canal wall. Aim: To assess and compare the dislocation resistance of root canals obturated with GuttaFusion® and TotalFill BC sealer versus single cone obturation technique and TotalFill BC sealer after instrumentation of the canals with WaveOne, ProTaper Next and ProTaper Universal system. Material and Method: Sixty extracted human permanent mandibular premolars were conducted in the current study. The teeth were decorated and left the root with 15mm length; the roots were divided randomly into three main groups, twenty roots in each group. The roots were instrumented with different rotary systems using crown down technique according to the groups: (Group I) was instrumented with WaveOne files. (Group II) was instrumented with ProTaper Next system and (Group III) was instrumented with ProTaper Universal system. For each group the same irrigation regimen was used, 3 mL of 5.25% sodium hypochlorite and 3 mL of 17% EDTA to remove the smear layer. Then, Group I was also subdivided randomly into two subgroups of ten samples each, (Group I A) obturated with single cone gutta-percha and (Group I B) filled with GuttaFusion®. Group II was divided into (Group II A) obturated with single cone gutta-percha and (Group II B) filled with GuttaFusion®. Group III was divided into (Group III A) obturated with single cone gutta-percha and (Group III B) obturated with GuttaFusion®. In the present study, TotalFill BC sealer was used for all the tested groups. Then, the roots were embedded in clear acrylic resin and each root sectioned into three sections of 2mm thick (apical, middle and coronal). The push-out bond strength values represented by (MPa) unit was calculated by dividing the load on the surface area and the last was measured in collaboration with AutoCAD system software program. Failure mode analysis was carried out to examine the type of failure in each sample by using a stereomicroscope. Results: The results showed highly significant differences among the main groups that instrumented with different rotary systems (WaveOne, ProTaper Next and ProTaper Universal system). There were highly significant differences between the two obturation techniques of the subgroups (single cone gutta-percha versus GuttaFusion®). However; Gutta-Fusion® showed highest bond strength value than single cone obturation technique. The coronal third slices of all groups showed highest value of bond strength in comparison to the middle thirds and apical thirds. In the meantime, the middle third slices showed bond strength higher than that of the apical thirds for all groups. Statistical analysis was performed by using two way ANOVA and LSD tests. Conclusions: The instrumentation techniques and the obturation materials significantly affected the push-out bond strength values of obturation system. The highest value was appointed in root canals instrumented with ProTaper Universal System; obturated with GuttaFusion® and BC sealer, whereas, the lowest bond strength was appeared at canals instrumented with ProTaper Next; obturated with single cone gutta-percha and BC sealer.
The current study aims to find a new plan to manage the water quality of the western part of the Hammar Marsh to reduce the salts that cause problems for the marshes and preserve their environmental life by isolating the southwestern part of the Hammar Marsh by closing the outlet under the railway embankment. The outlet is discharging saline water to the east-western part of Al Hammar Marsh. After isolating the southwestern part of the marsh, a new outlet is proposed. The impact of the flow hydrodynamics on improving the water quality was simulated using the SMS model. The hydrodynamics and water quality simulation models for the marsh are : a hydrodynamic model and average depth (SMS RMA2) and a two-dimensional water quality model (SMS
... Show MoreThe current study aims to investigate the effect of the interaction between the use of the improve strategy in teaching mathematics and the level of academic achievement on the acquisition of algebraic concepts and habits of mind among tenth-grade students in Oman. The study adopted the experimental method, based on a quasi-experimental design with two groups: experimental and control groups and pre-post-measurement. The study sample consisted of (28) 10th-grade students as an experimental group and 26 of 10th-grade students as a control group in Al-Tufail bin Amr School in South Al Batinah. The differences in the pretest and posttest gains were analyzed using mean, standard deviation, ANCOVA, t-test, effect size (eta-square), and two-wa
... Show MoreIn this paper, the dynamics of scavenger species predation of both susceptible and infected prey at different rates with prey refuge is mathematically proposed and studied. It is supposed that the disease was spread by direct contact between susceptible prey with infected prey described by Holling type-II infection function. The existence, uniqueness, and boundedness of the solution are investigated. The stability constraints of all equilibrium points are determined. In addition to establishing some sufficient conditions for global stability of them by using suitable Lyapunov functions. Finally, these theoretical results are shown and verified with numerical simulations.
The semiconductor ZnO is one of II – VI compound group, it is prepare as thin films by using chemical spray pyrolysis technique; the films are deposited onto glass substrate at 450 °C by using aqueous zinc chloride as a spray solution of molar concentration 0.1 M/L. Sample of the prepared film is irradiating by Gamma ray using CS 137, other sample is annealed at 550°C. The structure of the irradiated and annealed films are analyzed with X-ray diffraction, the results show that the films are polycrystalline in nature with preferred (002) orientation. The general morphology of ZnO films are imaged by using the Atomic Force Microscope (AFM), it constructed from nanostructure with dimensions in order of 77 nm.
The optical properties o
<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More