Background: The goal of a root canal treatment is three dimensional obturation with a complete seal of the root canal system. The aim of this study was to evaluate and compare the effect of two warm obturation techniques, warm vertical compaction (WVC) and, carrier based obturation technique Gutta Core (GC), versus two cold obturation techniques, cold lateral compaction (CLC) and, single cone (SC) on push-out bond strength of bioceramic sealer (Total Fill) at three different root levels. Materials and Methods: Forty extracted maxillary first molars teeth with a straight round palatal root canal and mature apices were selected for this study. After sectioning the palatal roots to 11 mm from the root apex, the canals were prepared with EDGEENDO X7 rotary system file from size 20 up to size 40 taper 04. The samples were then randomly separated into four groups based on obturation procedures (each group n = 10), with group A: obturated by WVC, group B: GC, group C: CLC, and group D: SC. Following obturation, the teeth were kept in an incubator at 37°C and 100% humidity for two weeks. Three slices of 2 mm thickness were cut horizontally at 2, 4.5, and 7 mm from the root apex in each of the three sections (apical, middle and coronal). The data were investigated using one-way ANOVA and Tukey's test with a significance level (p< 0.05). A digital microscope with a magnification of 60 X was used to establish the failure mode. Results: There was a significant increase in push-out bond strength following canal obturation with GC and WVC, particularly at the apical third (9.48, and 8.11 MPa, respectively) , compared to canals obturated with SC and CLC in all root levels except the middle third, at the (p< 0.05) significance level. The cohesive mode of failure was the most prevalent in all groups. Conclusio: BC (TotalFill) sealer showed higher bond strength when used in WVC and GC compared to other techniques. SC and CLC were showed comparable bond strength values.
The comparative method plays a major role in Maupassant’s novel (A woman’s Life).This is due to a good theme choice and smooth writing style characterized by simplicity, spontaneity and brevity.
The author uses the comparative method in the introduction of his novel where he compares the monastery’s closed world to the open world of the countryside of La Normandie, which represents the dream life of the heroine Jeanne.
The present paper is an attempt to answer the question regarding the importance of applying the comparative method in the novel (A Woman’s Life) by Maupassant. The paper stresses the fact that the novelist employs the comparative method in his book for certain features .One of these features is the
... Show MoreThis research aims to study the target costing and value chain with their complimentary relationship in reducing product costs, meeting the needs of customer, and achieving strategic competitive advantage for manufacturing corporations in response to face international competition, technological development and continuous changing expectations of customers. No doubt, the target costing and value chain both currently occupy a great deal of the attention of managers and accountants at the manufacturing corporations due to the significance to insure their continuity, growth and development. This significance has been the main motive to examine the role of target costing and value chain in a sample of public corporations of the
... Show MoreThis research paper studies the alienation of the intellectuals in the modern novel through the study of two alienated characters, John Marcher in Henry James's The Beast in the Jungle, and Mr. Duffy in James's Joyce's "A Painful Case." As a result of the complexity of life in the industrial societies, the individuals, especially the intellectual ones, feel themselves unable to integrate into social life; they fear society and feel that it endangers their individuality and independence. Thus, these characters live on the fringe of the societ
... Show MoreThe research aims to identify decent work and its impact in enhancing job immersion. The questionnaire was adopted as a tool to analyze the sample responses of (81) workers to represent an estimated response rate of (88 per cent) out of the total population of (92) individuals. The research adopted descriptive-analytical approach, and reliability calculation, arithmetic means standard deviations, relative importance, and regression analysis adopted on SPSS v.25. The conclusion shows that there is a medium correlation between decent work and job immersion, and there is a low impact of decent work with its dimensions in job immersion; extract the most important acceptable components for job from the sample point of view about the o
... Show MoreThe aim of this research is to apply Throughput Accounting in improving the cost leadership strategy for the woven fabric department (polyester blended - polyester 150/1) in the Waist Textile and Knitting Factory. The problem of the research is that the research sample laboratory does not apply modern cost management methods represented in Throughput Accounting, as the Iraqi economic units suffer from their inability to compete in the labor market in light of the competitive environment. The Ministry of Interior improved the cost leadership strategy for the product of blended polyester and polyester fabrics 1/150. Through the research, a set of conclusions was reached, the most important of which are: Improving the cost lea
... Show MoreThis article aims to establish and evaluate standards for critical equipment and materials in highway projects in Iraq. Delphi technique has been used to analyze, explore, and discover the main criteria and sub-criteria that affect equipment and materials in highway construction projects in Iraq. To determine the correct response to the criteria presented in this study, a program (IBM, SPSS/V25) was used to assess the main criteria and sub-criteria using the mean score (MS) and standard deviation (SD) technique, as well as to check reliability using Cronbach's alpha factor (α). The experts' qualifications and the extent to which the person is ready to commit are both important factors in panel selection. The design of a
... Show MoreBackground: Osteoarthritis is a chronic pathology of the joints causing disability and morbidity. Diacerein is a disease-modifying agent indicated for osteoarthritis management with enhanced performance and have much lower side effects profile than conventional non-steroidal anti-inflammatory drugs. Oral administration of Diacerein is associated with a laxative effect, thus causing treatment discontinuation. Aim: This study aimed to evaluate the activity of Diacerein novasome-based transdermal gel compared with standard oral treatment in the management of induced osteoarthritis in a rat model. Materials and methods: A single intra-articular injection of monosodium iodoacetate was administered to the left knee joint, resulting in the develop
... Show MoreObjective: Per-implantitis is one of the implant treatment complications. Dentists have failed to restore damaged periodontium by using conventional therapies. Tissue engineering (stem cells, scaffold and growth factors) aims to reconstruct natural tissues. The paper aimed to isolate both periodontal ligament stem cells (PDLSCs) and bone marrow mesenchymal stem cells (BMMSCs) and use them in a co-culture method to create three-layered cell sheets for reconstructing natural periodontal ligament (PDL) tissue. Materials and methods: BMMSCs were isolated from rabbit tibia and femur, and PDLSC culture was established from the lower right incisor. The cells were co-cultured to induce BMMSC differentiation into PDL cells. Cell morphology, stem cel
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More