Background: preparation of root canals is an important step in root canal treatment. Mechanical instrumentation of root canals cause an irregular layer of debris, known as the smear layer. As a result, several studies reported that preferring the removal of the smear layer. Objective: To study the influence of the energy (100 mJ) of Erbium, Chromium: Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration (60 μs) on smear layer removal of apical third after using Photon induced photoacoustic streaming technique. Materials and methods: Eighteen straight single-rooted mandibular premolars were used. The roots length were uniform to 14mm from the anatomic apex and instrumented using Protaper Gold Rotary NiTi file system to size 40 taper 0.06. Er,Cr:YSGG pulsed laser (waterlase iplus Biolase, CA, USA) 2780 nm was used at short pulse duration (60 μs, 5 Hz ,air and water off) delivered by MD/iplus Glass Tips (MZ6) 600 μm in diameter, length=6 mm, calibration factor= 1.00. Ultrasonic activator ENDO1 (Guilin Woodpecker Medical Instrument Co., Ltd.china) was used with Ultrasonic activator tip ED98 (25#, 2% taper, 18.5mm) (Guilin Woodpecker Medical Instrument Co., Ltd.china). The samples were arbitrarily divided into three groups (n=6) and used as follows: (A) conventional irrigation with 5 ml of 17 % EDTA, (B) passive ultrasonic irrigation with 5 ml of 17 % EDTA, (C) Er,Cr:YSGG induced photoacoustic streaming with 5 ml of 17 % EDTA. After final irrigation with normal saline and drying, the roots were painted with nail varnish externally, and 2% methylene blue dye injected into canal until the canal filled with dye. The tooth was splitted at the fourth millimeters from root apex with a diamond disc representing the apical third. Picture was taken by Professional Digital SLR camera (Nikon D7100, Nikon Corporation, Thailand) with 40X magnification. The dye penetration was measured by using analytical software (measure picture CAD-KAS Kessler Germany). ANOVA test was used to analyse repeated measure mean between tested concentration (5.25% NaOCL, 17% EDTA) and control. Data was expressed as mean±SD. LSD (Least Significant Difference) test was used to calculate the significant differences between tested mean. Results: The mean values of the percentage of dye penetration area in two experimental groups was higher than the control group, as the follow (20.79±1.15control, 34.5453±0.45 ultrasonic group, 85.9804±2.69 Er,Cr.YSGG+17%EDTA at 0.5 W). The Percentage of dye penetration in Er,Cr:YSGG laser induced photoacoustic streaming with 17% EDTA was significantly high (P value 0.001), followed by ultrasonic activated group, while control group result in less Percentage of dye penetration than both study groups. Conclusion: In this study, we concluded that Er,Cr:YSGG pulsed laser (0.5 W,5 Hz , air and water off) at short pulse duration (60 μs) with 17% EDTA using PIPS technique for activation of irrigant in endodontic treatment give better result than ultrasonic activation in smear layer removal
In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show More<span>Blood donation is the main source of blood resources in the blood banks which is required in the hospitals for everyday operations and blood compensation for the patients. In special cases, the patients require fresh blood for compensation such as in the case of major operations and similar situations. Moreover, plasma transfusions are vital in the current pandemic of coronavirus disease (COVID-19). In this paper, we have proposed a donation system that manages the appointments between the donors and the patient in the case of fresh blood donation is required. The website is designed using the Bootstrap technology to provide suitable access using the PC or the smart phones web browser. The website contains large database
... Show MoreIn the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThe purpose of this study is to illuminate the role of CBCT in forensic dentistry through variations of mandibular measurements of Bonwill’s triangles in gender determination among the Iraqi population.
In this retrospective study 70 CBCT scans were analyzed to measure the Bonwill’s triangle, 35 for males and 35 for females aged between 20 and 50 years, all data were collected at the oral and maxillofacial radiology department in Ghazi AL-Hariri hospital for 3 months, and the data were obtained using a Kavo CBCT device (3D On De
In this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err
... Show More