Introduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were determined using a universal testing machine. The radiographic appearance was established using digital periapical radiographs. Results: The composite core carrier exhibited a melting point of 111°C to 112°C, which would facilitate removal by heat application. The elastic modulus and the tensile strength were found to be lower than those of Thermafil carriers (Dentsply Tulsa Dental, Tulsa, OK). The preliminary radiographic evaluation showed that the novel composite core carrier is sufficiently radiopaque and can be distinguished from gutta-percha. Conclusions: The PE-HA-SrO composites were successfully melt processed into composite core carriers for delivering gutta-percha into the root canal space.
Activity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif
... Show MoreThe influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic
... Show MoreThe unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreBackground: Many studies have been conducted to evaluate the effect of using a hot material in the root canal and its potential for causing damage to the tooth supporting structure. Materials and methods: thirty permanent premolars were obturated with thermoplasticized Gutta-Percha using three different obturation techniques: soft core, Thermafil, and obtura to evaluate the rise in temperature on the root surface using a multipurpose digital thermometer. Results: temperature increases was significantly greater for Obtura versus Soft core (p<0.003), not significant for Thermafil versus Soft core (p<0.087), and Thermafil versus Obtura (p<0.125). Conclusions: temperatures rise on the root surface were below the critical level and, therefore, s
... Show MoreBackground: The bond strength of endodontic sealers with dentin is a very important property for maintaining the integrity and seal of the root canal filling. The aim of this study was to evaluate and compare the effect of various irrigants (QMix, 17% EDTA and 2.5% NaOCl) on the push-out bond strength of AH plus and Bioceramic sealers. Materials and methods: Forty eight freshly extracted maxillary first molars human teeth with striaght palatal root were used in the study. The collected samples were randomly divided into three groups of equal sample size (n=16), according to the final irrigation regimen as follows: Group (1): QMix 2 in 1, Group (2): 17% ethylenediaminetetraacetic acid, Group (3): 2.5% sodium hypochloride. All samples were
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreAn evaluation the performance of the irrigation system for the Al-Ishaqi irrigation project for the Eastern Canal was conducted to identify management strategies that can be used to improve the operation and performance of the irrigation system. The study area is located in Salah al-Din G.0overnorate, Iraq. The field work included determining the moisture content of the soil before and after irrigation, measuring the inflow of the field to find the depth of the applied water, field monitoring, and measuring the depth of the root zone for each irrigation process. Field measurements showed that the average efficiency of water application for the two fields (A, and B) are 59.81% and 38.6%, respectively. The results of the efficiency of
... Show More