Preferred Language
Articles
/
ijl-269
Permeability of Radicular Dentine after Using Different Irrigant Activation Techniques Including Photo Induce Photoacoustic Streaming Technique
...Show More Authors

Background: preparation of root canals is an important step in root canal treatment. Mechanical instrumentation of root canals cause an irregular layer of debris, known as the smear layer. As a result, several studies reported that preferring the removal of the smear layer. Objective: To study the influence of the energy (100 mJ) of Erbium, Chromium: Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration (60 μs)  on smear layer removal of apical third after using Photon induced photoacoustic streaming technique. Materials and methods: Eighteen straight single-rooted mandibular premolars were used. The roots length were uniform to 14mm from the anatomic apex and instrumented using Protaper Gold Rotary NiTi file system to size 40 taper 0.06. Er,Cr:YSGG pulsed laser (waterlase iplus Biolase, CA, USA) 2780 nm was used at short pulse duration (60 μs, 5 Hz ,air and water off) delivered by MD/iplus Glass Tips (MZ6) 600 μm in diameter, length=6 mm, calibration factor= 1.00. Ultrasonic activator ENDO1 (Guilin Woodpecker Medical Instrument Co., Ltd.china) was used with Ultrasonic activator tip ED98 (25#, 2% taper, 18.5mm) (Guilin Woodpecker Medical Instrument Co., Ltd.china). The samples were arbitrarily divided into three groups (n=6) and used as follows: (A) conventional irrigation with 5 ml of 17 % EDTA, (B) passive ultrasonic irrigation with 5 ml of 17 % EDTA,  (C) Er,Cr:YSGG induced photoacoustic streaming  with 5 ml of 17 % EDTA. After final irrigation with normal saline and drying, the roots were painted with nail varnish externally, and 2% methylene blue dye injected into canal until the canal filled with dye. The tooth was splitted at the fourth millimeters from root apex with a diamond disc representing the apical third. Picture was taken by Professional Digital SLR camera (Nikon D7100, Nikon Corporation, Thailand) with 40X magnification. The dye penetration was measured by using analytical software (measure picture CAD-KAS Kessler Germany). ANOVA test was used to analyse repeated measure mean between tested concentration (5.25% NaOCL, 17% EDTA) and control. Data was expressed as mean±SD. LSD (Least Significant Difference) test was used to calculate the significant differences between tested mean. Results: The mean values of the percentage of dye penetration area in two experimental groups was higher than the control group, as the follow (20.79±1.15control, 34.5453±0.45 ultrasonic group, 85.9804±2.69 Er,Cr.YSGG+17%EDTA at 0.5 W). The Percentage of dye penetration in Er,Cr:YSGG laser induced photoacoustic streaming with 17% EDTA was significantly high (P value 0.001), followed by ultrasonic activated group, while control group result in less Percentage of dye penetration than both study groups.  Conclusion: In this study, we concluded that Er,Cr:YSGG  pulsed laser  (0.5 W,5 Hz , air and water off) at short pulse duration (60 μs) with 17% EDTA using PIPS technique for activation of irrigant in endodontic treatment give better result than ultrasonic activation  in smear layer removal

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 18 2018
Journal Name
Proceedings Of The Future Technologies Conference (ftc) 2018
Using Mouse Dynamics for Continuous User Authentication
...Show More Authors

View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Nov 01 2021
Journal Name
University Of Baghdad, College Of Education For Pure Sciences \ Ibn Al-haitham, Department Of Mathematics
SOME ALPHA-TOPOLOGICAL CONCEPTS USING GRAPH THEORY
...Show More Authors

This dissertation depends on study of the topological structure in graph theory as well as introduce some concerning concepts, and generalization them into new topological spaces constructed using elements of graph. Thus, it is required presenting some theorems, propositions, and corollaries that are available in resources and proof which are not available. Moreover, studying some relationships between many concepts and examining their equivalence property like locally connectedness, convexity, intervals, and compactness. In addition, introducing the concepts of weaker separation axioms in α-topological spaces than the standard once like, α-feebly Hausdorff, α-feebly regular, and α-feebly normal and studying their properties. Furthermor

... Show More
Publication Date
Tue Sep 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Dye Removal from Wastewater Using Iron Salts
...Show More Authors

This investigation was carried out to study the treatment and recycling of wastewater in the cotton textile industry for an effluent containing three dyes: direct blue, sulphur black and vat yellow. The reuse of such effluent can only be made possible by appropriate treatment method such as chemical coagulation. Ferrous and ferric sulphate with and without calcium hydroxide were employed in this study as the chemical coagulants.
The results showed that the percentage removal of direct blue ranged between 91.4 and 94 , for sulphur black ranged between 98.7 and 99.5 while for vat yellow it was between 97 and 99.

View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Isolated Word Speech Recognition Using Mixed Transform
...Show More Authors

Methods of speech recognition have been the subject of several studies over the past decade. Speech recognition has been one of the most exciting areas of the signal processing. Mixed transform is a useful tool for speech signal processing; it is developed for its abilities of improvement in feature extraction. Speech recognition includes three important stages, preprocessing, feature extraction, and classification. Recognition accuracy is so affected by the features extraction stage; therefore different models of mixed transform for feature extraction were proposed. The properties of the recorded isolated word will be 1-D, which achieve the conversion of each 1-D word into a 2-D form. The second step of the word recognizer requires, the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Genetic--Based Face Retrieval Using Statistical Features
...Show More Authors

Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
FACE IDENTIFICATION USING BACK-PROPAGATION ADAPTIVE MULTIWAVENET
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2017
Journal Name
2017 Annual Conference On New Trends In Information & Communications Technology Applications (ntict)
An efficient color quantization using color histogram
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
2008 Ieee International Joint Conference On Neural Networks (ieee World Congress On Computational Intelligence)
Linear block code decoder using neural network
...Show More Authors

View Publication
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref