Abstract: The aim of this study is to assess the effectiveness of 940 nm diode laser in comparison to Endoactivator in elimination of smear layer in terms of radicular dentin permeability and ultra-structural changes of root canal walls by SEM evaluation. Twenty-eight single-rooted extracted lower premolars were instrumented up to size X4 (protaper Next, Dentsaply) and divided into two experimental groups according to the irrigation system, G1; activated by EndoActivator and G2; activated by Diode laser 940 nm, CW mode, 1.7 W. Afterward, the roots were made externally impermeable, filled with 2%methylene blue dye, divided horizontally into three segments representing the apical, middle, and coronal thirds then examined under stereo- microscope. Using analytical software, the root section area and dye penetration area were measured, and then, the percentage of net dye penetration area was calculated. Additionally, scanning electron microscope investigations were accomplished. The non-parametric Mann-Whitney U test was done and showed significant difference between the two experimental groups over the three root thirds and the dye penetration in diode laser group was significantly higher over the whole root length compared to the Endoactivator group. Scanning electron micrographs of diode laser group showed a distinctive removal of smear layer with preservation of the annular structure of dentinal tubules, while EndoActivator group produced uneven removal of smear layer, in efficient cleanliness especially in the apical third.
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
The research aims to investigate the possibility of joint auditing in improving the market value of Iraqi companies listed on the Iraq Stock Exchange. The sample was represented by 10 Iraqi companies listed in the Iraq market for the period from 2014-2017 (2 years before implementation and 2 years after implementation) and the research was based on the idea that joint auditing enhances investor confidence and raises their level of security as a result of providing quality and reliable reports, and thus This indicates good news in the market that reflects on the performance of stocks and the market value of companies that adopt joint auditing. The results of the analysis indicate an improvement in the market value, but this improv
... Show MoreIn this thesis, we study the topological structure in graph theory and various related results. Chapter one, contains fundamental concept of topology and basic definitions about near open sets and give an account of uncertainty rough sets theories also, we introduce the concepts of graph theory. Chapter two, deals with main concepts concerning topological structures using mixed degree systems in graph theory, which is M-space by using the mixed degree systems. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are defined and studied. In chapter three we study supra-approximation spaces using mixed degree systems and primary object in this chapter are two topological
... Show MoreBackground: The restoration of bone continuity and bone union are complex processes, and their success is determined by the effectiveness of osteosynthesis. The use of plants for healing purposes predates human history and forms the source of current modern medicine The aim of this study: It was histological evaluation of effect of topical application of flavonoid on healing of induced bone defect in rabbit tibia. Material and method: Twenty-four Adult New Zealand rabbits used in this study, they were divided into four groups for the healing periods (3days, 1,2, and 4weeks) Two holes were induced in rabbit tibia one on the left side and has been left to heal normally as control. While, the other hole made on the right side filled with flavo
... Show MoreThe use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreBecome organizations today can not withstand the competitive challenges and constant change in the business environment , as well as the pressures witnessed by the Iraqi environment , especially in recent years such as the opening of the market which increased ambitious organizations and desire to secure the experiences superior to the survival and expansion of the competitive environment , prompting attention to the subject of vital contemporary is emotional Marketing and measure its impact on the customer experience in the sector of the economy is important and is the financial sector , so there is a need to study this term in the Iraqi organizations and try to diagnose the extent of implementation of the study sample emo
... Show MoreBackground: changing in lifestyle like displacing place could cause depression which is a common mental disorder that change general health that affect dental caries incidence and severity. The aims of this study were to assess the relation of depression status on prevalence and severity of dental caries among internally displaced people. Material and Method: The sample include 121 internally displaced people aged from 13-17 years. Method for depression measuring is by using Children Depression Inventory (CDI2) questionnaire. Dental caries is measured by using caries experience (DMFs) and caries severity D1-4. Result: the mean value for decayed and missing surfaces were higher in high depression grade as compering with low and medium dep
... Show MoreThis study aims to highlight the role of financial control in the development of government performance through the use of "GFS" system and its application in the service of government units, which will help them in how to use financial resources efficiently through the quality of accounting information provided by this system in the financial statements that reflect the predictability in that fiscal policy of the state through government programs and activities fee as well as to identify weaknesses and address them quickly in order to avoid wastage and loss of public money, which leads to the possibility of utilization of available financial resources of the state to effectively and efficiently, has been reached that the failure of gove
... Show More