Background: preparation of root canals is an important step in root canal treatment. Mechanical instrumentation of root canals cause an irregular layer of debris, known as the smear layer. As a result, several studies reported that preferring the removal of the smear layer. Objective: To study the influence of the energy (100 mJ) of Erbium, Chromium: Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration (60 μs) on smear layer removal of apical third after using Photon induced photoacoustic streaming technique. Materials and methods: Eighteen straight single-rooted mandibular premolars were used. The roots length were uniform to 14mm from the anatomic apex and instrumented using Protaper Gold Rotary NiTi file system to size 40 taper 0.06. Er,Cr:YSGG pulsed laser (waterlase iplus Biolase, CA, USA) 2780 nm was used at short pulse duration (60 μs, 5 Hz ,air and water off) delivered by MD/iplus Glass Tips (MZ6) 600 μm in diameter, length=6 mm, calibration factor= 1.00. Ultrasonic activator ENDO1 (Guilin Woodpecker Medical Instrument Co., Ltd.china) was used with Ultrasonic activator tip ED98 (25#, 2% taper, 18.5mm) (Guilin Woodpecker Medical Instrument Co., Ltd.china). The samples were arbitrarily divided into three groups (n=6) and used as follows: (A) conventional irrigation with 5 ml of 17 % EDTA, (B) passive ultrasonic irrigation with 5 ml of 17 % EDTA, (C) Er,Cr:YSGG induced photoacoustic streaming with 5 ml of 17 % EDTA. After final irrigation with normal saline and drying, the roots were painted with nail varnish externally, and 2% methylene blue dye injected into canal until the canal filled with dye. The tooth was splitted at the fourth millimeters from root apex with a diamond disc representing the apical third. Picture was taken by Professional Digital SLR camera (Nikon D7100, Nikon Corporation, Thailand) with 40X magnification. The dye penetration was measured by using analytical software (measure picture CAD-KAS Kessler Germany). ANOVA test was used to analyse repeated measure mean between tested concentration (5.25% NaOCL, 17% EDTA) and control. Data was expressed as mean±SD. LSD (Least Significant Difference) test was used to calculate the significant differences between tested mean. Results: The mean values of the percentage of dye penetration area in two experimental groups was higher than the control group, as the follow (20.79±1.15control, 34.5453±0.45 ultrasonic group, 85.9804±2.69 Er,Cr.YSGG+17%EDTA at 0.5 W). The Percentage of dye penetration in Er,Cr:YSGG laser induced photoacoustic streaming with 17% EDTA was significantly high (P value 0.001), followed by ultrasonic activated group, while control group result in less Percentage of dye penetration than both study groups. Conclusion: In this study, we concluded that Er,Cr:YSGG pulsed laser (0.5 W,5 Hz , air and water off) at short pulse duration (60 μs) with 17% EDTA using PIPS technique for activation of irrigant in endodontic treatment give better result than ultrasonic activation in smear layer removal
This paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.
The main work of this paper is devoted to a new technique of constructing approximated solutions for linear delay differential equations using the basis functions power series functions with the aid of Weighted residual methods (collocations method, Galerkin’s method and least square method).
A joke is something that is said, written, or done to cause amusement or laughter. It could be a short piece or a long narrative joke, but either way it ends in a punchline, where the joke contains a second conflicting meaning. Sometimes when we read a joke, we understand it directly and fully, but this is not always the case. When a writer writes a joke, he intends to manipulate the reader in a way that the reader doesn’t get the joke at once. He does that by using pun on words or any other word play. We, as listeners to the joke, try to get the message depending mostly on the tone of the voice, in addition to other factors concerning vocabulary and grammar. But as readers of the joke, we need more other factors in order to get
... Show MoreIn this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
The use of antibiotics (AB) in surgery focused in either treating established infection or to prevent suspected post-operative infection. Inappropriate use of antibiotic for treatment of patients with common infections is a major problem worldwide, with great implications with regards to cost of treatment and development of resistance to the antimicrobial agent. Moreover, antibiotics may often be dispensed without a clear clinical indication. This study was conducted to estimate the medication errors in using antibiotic for surgery patients which may effect their wound healing. A 260 patients with clean-contaminated and contaminated surgery were included from two teaching hospitals, 160 patient from Medical city hospital and 100 fro
... Show MoreDue to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show More