The dynamic thermomechanical properties, sealing ability, and voids formation of an experimental obturation hydroxyapatite-reinforced polyethylene (HA/PE) composite/carrier system were investigated and compared with those of a commercial system [GuttaCore (GC)]. The HA/PE system was specifically designed using a melt-extrusion process. The viscoelastic properties of HA/PE were determined using a dynamic thermomechanical analyser. Human single-rooted teeth were endodontically instrumented and obturated using HA/PE or GC systems, and then sealing ability was assessed using a fluid filtration system. In addition, micro-computed tomography (μCT) was used to quantify apparent voids within the root-canal space. The data were statistically analysed using one-way anova and post hoc tests. The HA/PE composite exhibited important modulus and damping changes with an increase of temperature. The HA/PE system was more flexible than GC as the modulus of GC appeared to be significantly higher than that of HA/PE as a result of the high positive glass transition temperature (Tg). However, HA/PE and GC presented similar sealing abilities. In conclusion, because sealing ability and voids formation were comparable between the tested materials, the experimental HA/PE system may be considered a suitable alternative material for root-canal obturation. Moreover, HA/PE possesses specific viscoelastic behaviour and lower melting points, which may facilitate root-canal retreatments.
Abstract
This research deals with Building A probabilistic Linear programming model representing, the operation of production in the Middle Refinery Company (Dura, Semawa, Najaif) Considering the demand of each product (Gasoline, Kerosene,Gas Oil, Fuel Oil ).are random variables ,follows certain probability distribution, which are testing by using Statistical programme (Easy fit), thes distribution are found to be Cauchy distribution ,Erlang distribution ,Pareto distribution ,Normal distribution ,and General Extreme value distribution . &
... Show MoreThe present study was investigated the activity of aqueous extract from Cinnamomum cassia bark on the blood glucose levels in healthy and diabetic rats induced by Streptozotcin (STZ). In healthy rats the blood glucose levels were slightly decreased after six hoursof single oral administration with dose (25 mg/kg) of body wight, as well as four weeks after twice daily repeated oral administration of aqueous extract of Cinnamomum cassia bark. In streptozotocin induced diabetic rats we absorved high significant decreased (p<0.05) in blood glucose levels, after four weeks of oral administration of aqueous extract (25 mg /kg ).And blood glucose levels seems to be normal after the period of treatment .Glibenclamide used as standard drug to com
... Show MorePraise be to God, prayer and peace be upon the Messenger of Allah and after :
For the Holy Qur’an is the constitution of this nation, and it has included everything that the nation needs, and it has appropriate solutions for all the problems it faces, and for a long time the nation has its vision for the future, waiting for a leader who carries the concerns of this nation and proceeds towards progress and progress, so that it rises to the glory and glory. He brings it out from what it is today, from its deterioration in all levels.
The world has witnessed in recent decades the development of programs and curricula, and books have been prepared showing how to prepare leaders and their industry, and what programs they should adopt
(1) Background: Plant flavonoids are efficient in preventing and treating various diseases. This study aimed to evaluate the ability of hesperidin, a flavonoid found in citrus fruits, in inhibiting lipopolysaccharide (LPS) induced inflammation, which induced lethal toxicity in vivo, and to evaluate its importance as an antitumor agent in breast cancer. The in vivo experiments revealed the protective effects of hesperidin against the negative LPS effects on the liver and spleen of male mice. (2) Methods: In the liver, the antioxidant activity was measured by estimating the concentration of glutathione (GSH) and catalase (CAT), whereas in spleen, the concentration of cytokines including IL-33 and TNF-α was measured. The in vitro expe
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More