Abstract: The aim of this study is to assess the effectiveness of 940 nm diode laser in comparison to Endoactivator in elimination of smear layer in terms of radicular dentin permeability and ultra-structural changes of root canal walls by SEM evaluation. Twenty-eight single-rooted extracted lower premolars were instrumented up to size X4 (protaper Next, Dentsaply) and divided into two experimental groups according to the irrigation system, G1; activated by EndoActivator and G2; activated by Diode laser 940 nm, CW mode, 1.7 W. Afterward, the roots were made externally impermeable, filled with 2%methylene blue dye, divided horizontally into three segments representing the apical, middle, and coronal thirds then examined under stereo- microscope. Using analytical software, the root section area and dye penetration area were measured, and then, the percentage of net dye penetration area was calculated. Additionally, scanning electron microscope investigations were accomplished. The non-parametric Mann-Whitney U test was done and showed significant difference between the two experimental groups over the three root thirds and the dye penetration in diode laser group was significantly higher over the whole root length compared to the Endoactivator group. Scanning electron micrographs of diode laser group showed a distinctive removal of smear layer with preservation of the annular structure of dentinal tubules, while EndoActivator group produced uneven removal of smear layer, in efficient cleanliness especially in the apical third.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.
A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin misassignment .The present results show an acceptable agreement with the combinatorial method of level density.
... Show MoreIn many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreFinance is an essential element when developing any housing policy because of its role in providing funds to institutions concerned with housing lending. Therefore, the research aims to evaluate the financial aid provided by the Central Bank of Iraq in solving the housing crisis through the adoption of the Central Bank of Iraq initiatives to support the financing of the housing sector, and here The importance of the research is highlighted to determine the role of the initiative by drawing an effective strategy aimed at providing the housing sector with the necessary funding. By providing financing to financial institutions directed towards providing real estate credit, and that the percentage of the contribution of the implement
... Show MoreThe research deals with the problems of improvisation in two basic subjects and applied a samples and conclusion. The first topic focuses on the concept of improvisation and spontaneity and clarifies the confusion between them. The second topic deals with the foundations and principles on which the actor is based in his artistic preparation for the purpose of developing his improvisational abilities.
The research focuses on clarifying the dimensions of improvisational techniques and its multiplicity in the modern theater. It analyzes the method of improvisation and its use in the construction and composition of the theatrical performance. It deals with two important experiments, such as the experience of the Russian directo
... Show MoreThe tax exemption, whether wholly or partially, and for an unlimited duration of the investment or for a limited period of few years, is one of the encouraging things to the flow of foreign capital. And if necessary, impose tax on the profits of the invested capital, the promotion requires that not be discriminatory taxes or payments in the amount of money with the need to avoid double taxation. The tax exemption is granted by the government and the feature according to the law of a natural person or legal entity seeking from the government purports to achieve a set of political goals, economic and social development. The reduction of taxes or grants partial exemption is one of the factors that encourage attract of direct foreign i
... Show MoreThe direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li
... Show MoreThe purpose of this paper is to identifying some of the physical, kinetic and electrical capabilities of the working muscles of patients with simple hemiplegic cerebral palsy, preparation of special exercises (rehabilitation and water) accompanied by symmetrical electrical stimulation in the rehabilitation of working muscles for patients with simple hemiplegic cerebral palsy, and identifying the effect of exercises, especially (rehabilitation and water), accompanied by symmetrical electrical stimulation, on some physical, kinetic and electrical capabilities in rehabilitating working muscles for patients with simple hemiplegic cerebral palsy. The researcher used the experimental approach with a one-group design with two pre and post-tests du
... Show More