Preferred Language
Articles
/
ijl-269
Permeability of Radicular Dentine after Using Different Irrigant Activation Techniques Including Photo Induce Photoacoustic Streaming Technique
...Show More Authors

Background: preparation of root canals is an important step in root canal treatment. Mechanical instrumentation of root canals cause an irregular layer of debris, known as the smear layer. As a result, several studies reported that preferring the removal of the smear layer. Objective: To study the influence of the energy (100 mJ) of Erbium, Chromium: Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration (60 μs)  on smear layer removal of apical third after using Photon induced photoacoustic streaming technique. Materials and methods: Eighteen straight single-rooted mandibular premolars were used. The roots length were uniform to 14mm from the anatomic apex and instrumented using Protaper Gold Rotary NiTi file system to size 40 taper 0.06. Er,Cr:YSGG pulsed laser (waterlase iplus Biolase, CA, USA) 2780 nm was used at short pulse duration (60 μs, 5 Hz ,air and water off) delivered by MD/iplus Glass Tips (MZ6) 600 μm in diameter, length=6 mm, calibration factor= 1.00. Ultrasonic activator ENDO1 (Guilin Woodpecker Medical Instrument Co., Ltd.china) was used with Ultrasonic activator tip ED98 (25#, 2% taper, 18.5mm) (Guilin Woodpecker Medical Instrument Co., Ltd.china). The samples were arbitrarily divided into three groups (n=6) and used as follows: (A) conventional irrigation with 5 ml of 17 % EDTA, (B) passive ultrasonic irrigation with 5 ml of 17 % EDTA,  (C) Er,Cr:YSGG induced photoacoustic streaming  with 5 ml of 17 % EDTA. After final irrigation with normal saline and drying, the roots were painted with nail varnish externally, and 2% methylene blue dye injected into canal until the canal filled with dye. The tooth was splitted at the fourth millimeters from root apex with a diamond disc representing the apical third. Picture was taken by Professional Digital SLR camera (Nikon D7100, Nikon Corporation, Thailand) with 40X magnification. The dye penetration was measured by using analytical software (measure picture CAD-KAS Kessler Germany). ANOVA test was used to analyse repeated measure mean between tested concentration (5.25% NaOCL, 17% EDTA) and control. Data was expressed as mean±SD. LSD (Least Significant Difference) test was used to calculate the significant differences between tested mean. Results: The mean values of the percentage of dye penetration area in two experimental groups was higher than the control group, as the follow (20.79±1.15control, 34.5453±0.45 ultrasonic group, 85.9804±2.69 Er,Cr.YSGG+17%EDTA at 0.5 W). The Percentage of dye penetration in Er,Cr:YSGG laser induced photoacoustic streaming with 17% EDTA was significantly high (P value 0.001), followed by ultrasonic activated group, while control group result in less Percentage of dye penetration than both study groups.  Conclusion: In this study, we concluded that Er,Cr:YSGG  pulsed laser  (0.5 W,5 Hz , air and water off) at short pulse duration (60 μs) with 17% EDTA using PIPS technique for activation of irrigant in endodontic treatment give better result than ultrasonic activation  in smear layer removal

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 02 2024
Journal Name
Al-iraqia Journal Of Scientific Engineering Research
Prioritise Five Tafseer Translators Using Clustering Technique for Surah Al-Baqarah
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Technique For Image De-blurring Using Adaptive Wavelet Lagrange Fuzzy Filter
...Show More Authors

A new de-blurring technique was proposed in order to reduced or remove the blur in the images. The proposed filter was designed from the Lagrange interpolation calculation with adjusted by fuzzy rules and supported by wavelet decomposing technique. The proposed Wavelet Lagrange Fuzzy filter gives good results for fully and partially blurring region in images.
 

View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
Enhancing LSB algorithm against brute-force attack using ASCII mapping technique
...Show More Authors

Publication Date
Wed Apr 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design for Two Electrodes Electrostatic Mirror by using the Bimurzaev Technique
...Show More Authors

This paper describes theoretical modeling of electrostatic mirror based on two cylindrical electrodes, A computational investigation has been carried out on the design and properties of the electrostatic  mirror. we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The  beam path  by using the Bimurzaev technique have been investigated as a mirror trajectory with the aid of Runge – Kutta  method. the electrode shape of mirror two electrode has been determined by using package SIMION computer program . The spherical and chromatic aberrations coefficients of mirror has been computed and normalized in terms of the focal length. The choice of the mirror depends on the op

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Control the deposition uniformity using ring cathode by DC discharge technique
...Show More Authors

Simulation of direct current (DC) discharge plasma using
COMSOL Multiphysics software were used to study the uniformity
of deposition on anode from DC discharge sputtering using ring and
disc cathodes, then applied it experimentally to make comparison
between film thickness distribution with simulation results. Both
simulation and experimental results shows that the deposition using
copper ring cathode is more uniformity than disc cathode

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Automatic human ear detection approach using modified adaptive search window technique
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 16 2022
Journal Name
2022 Muthanna International Conference On Engineering Science And Technology (micest)
A hybrid feature selection technique using chi-square with genetic algorithm
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Digital Rock Samples Porosity Analysis by OTSU Thresholding Technique Using MATLAB
...Show More Authors

Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref