Background: The final stage of endodontic therapy is complete obturation of the root canal system to provide as perfect as possible at the cementodentinal junction of the apical foramen. The purpose of this in vitro study was to evaluate the sealing ability of injection molded thermoplasticized gutta percha and lateral condensation techniques with and without the use of sealers. Materials and Methods: Forty freshly extracted adult human maxillary central incisors with complete formed apices were utilized in this study. The teeth were randomly divided into four groups for evaluation of the apical seal. Group (1) lateral condensation gutta percha technique without sealer, (2) lateral condensation gutta percha technique with sealer, (3) Injection molded thermo plasticized gutta percha without sealer, (4) injection molded thermoplasticized gutta percha with sealer. Groups 1 through 4 were obturated as specified. All of the teeth were immersed in flourescine dye for 48 hours, then they were removed from the dye for microleakage measurement. Results: The results showed no significant differences between groups 1 and 3 and between groups 2 and 3 (p>0.05), but there were highly significant differences between groups 1 and 3 (p<0.01). Conclusion: Sealer was found to be an essential part of the thermo plasticized gutta percha and lateral condensation techniques. Thermo plasticized system with sealer had significantly less apical leakage than others. The highest amount of leakage was significantly seen with lateral condensation without sealer.
This paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.
The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th
... Show More
One and two-dimensional hydraulic models simulations are important to specify the hydraulic characteristics of unsteady flow in Al-Gharraf River in order to define the locations that facing problems and suggesting the necessary treatments. The reach in the present study is 58200m long and lies between Kut and Hai Cities. Both numerical models were simulated using HEC-RAS software, 5.0.4, with flow rates ranging from 100 to 350 m3/s. Multi-scenarios of gates openings of Hai Regulator were applied. While the openings of Al-Gharraf Head Regulator were ranged between 60cm to fully opened. The suitable manning roughness for the unsteady state was
... Show Moreconversation is an oral skill in which two persons can exchange their ideas, thoughts and opinions to communicate with each other. Learners can work in pairs or groups to practice dialogues chosen by the teacher from their textbook materials or from additional resources. Nowadays, because of Corona virus infection, our college students are taught all the subjects including conversation course either via google classroom platform or any other platforms. Google meet is one of online meetings between the teacher and students, i.e., a video meet in which students and the teacher join the online meetings in a specified time to communicate, express their ideas, thoughts and feelings about what is mentioned above. In this study, the resea
... Show MoreIs the subject of Facebook of more topics that aroused interest and that it provides the features and services that allows users to direct communication and interaction and dialogue with others, and deals with the subject of research the use of Facebook and its effects left by the social relations, as the field study was conducted on a sample of 130 students from students Baghdad University of males and females in the Faculty of Political Science and Agriculture, Science and Education, Girls, and limited the sample to Facebook users exclusively to test the study hypotheses and relationships connectivity, and the results revealed the presence of a significant impact of Facebook in th
... Show MoreThe electric energy is one of the most important renewable energies used in the world as it is the main source for sustainable development and economic development through its use in (production, transport and distribution), and in Iraq, the electric power sector has suffered from many problems and obstacles, as providing electric current is one of the most prominent difficulties and challenges That successive governments and residents have faced since the early nineties of the last century and are still ongoing, and that Iraq has all the climatic conditions for developing the work of the electricity system from renewable energies such as solar and hydroelectric energy, as well as gas fields that have become a Basic pillar of pow
... Show MoreIn this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.
The financial markets are one of the sectors whose data is characterized by continuous movement in most of the times and it is constantly changing, so it is difficult to predict its trends , and this leads to the need of methods , means and techniques for making decisions, and that pushes investors and analysts in the financial markets to use various and different methods in order to reach at predicting the movement of the direction of the financial markets. In order to reach the goal of making decisions in different investments, where the algorithm of the support vector machine and the CART regression tree algorithm are used to classify the stock data in order to determine
... Show More
his project try to explain the using ability of spatial techniques for land cover change detection on regional level with the time parameter and did select for explain these abilities study case (Hewaizah marsh ) . this area apply to many big changes with the time. These changes made action on characters and behaviors of this area as well as all activities in it . This Project concerting to recognize the Using importance of remote sensing and GIS Methodology in data collecting for the changes of land use and the methodology for the analyses and getting the results for the next using as a base data for development and drawing the plans as well as in regional planning .This project focus on practical
... Show MoreTo study the site of placentae and the umbilical artery blood flow of different age groupsand relate that to the newborn baby and the mother. 117 placentae samples were investigatedusing ultrasound and 30 placentae samples were studied using Doppler ultrasound during theperiod from August 2007 to August 2008 for full term placentae of mothers aged 15- > 45 yearsold. By ultrasound; there was detection of good pe rcentage of the placental site to be on theposterior wall of the uterus in case of male babies, while it was anterior in case of female babiesand it was previa and fundal in females more than in the males. The Doppler ultrasound revealedthat the mother in any age group can conceive and have a healthy placenta because the readings ina
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.