Preferred Language
Articles
/
ixixlJQBVTCNdQwCFR0o
Comparison of root canal transportation and centering after instrumentation through conservative and traditional access cavities using different file systems
...Show More Authors
Introduction:

While conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).

Materials and Methods:

Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this study. Teeth were equally divided into two groups according to the access cavity design (traditional or conservative). Each group (n = 20) was further subdivided according to instrumentation technique (n = 10) into rotary 2 shape and reciprocation R-motion file subgroups. The teeth were scanned pre and post instrumentation using Planmeca ProMax to obtain two CBCT images for each sample. Images were analyzed and root canal transportation and centering ability were calculated for both buccal and palatal roots at three levels from their apices (3, 5 to 7 mm).

Results:

Although conservative access cavities showed more canal transportation and less centering ability than the traditional one, there was no statistically significant difference (P > 0.05) between them at all levels. Furthermore, no statistically significant difference has been identified in the same parameter between the two instrumentation techniques (continuous rotation and reciprocation) (P > 0.05). However, longer instrumentation time was measured in the conservative group compared to traditional.

Conclusion:

The size of endodontic access cavity has no effect on root canal transportation and centering ability when instrumentation was performed using 2 shape and R-motion file systems.

Scopus Crossref
View Publication
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Proceedings Of The Aintec 2014 On Asian Internet Engineering Conference - Aintec '14
LTE Peak Data Rate Estimation Using Modified alpha-Shannon Capacity Formula
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Direct method for Solving Nonlinear Variational Problems by Using Hermite Wavelets
...Show More Authors

In this work, we first construct Hermite wavelets on the interval [0,1) with it’s product, Operational matrix of integration 2^k M×2^k M is derived, and used it for solving nonlinear Variational problems with reduced it to a system of algebric equations and aid of direct method. Finally, some examples are given to illustrate the efficiency and performance of presented method.

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2016
Journal Name
Australian Journal Of Basic And Applied Sciences
Programming Exam Questions Classification Based On Bloom’s Taxonomy Using Grammatical Rule
...Show More Authors

Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Evaluating Industrial Products emotionally by Using Emojis: محمد علي حسين القيسي
...Show More Authors

Researches in the field of evaluation of industrial products emotionally are internationally new and non-existing in the Arabic speaking countries, which is considered the crux of the problem in the current research, in addition to the need of the designers and design students to know how to measure the emotional responses for the industrial product in order to get benefit from them in their designs. The research objective is to get a tool that uses emojis in measuring the emotional responses for the products. The researcher designed an emotional verbal wheel and emojis wheel. The sample of the research consisted of (7) chairs different in design and use, and the respondents were (89) students. The most important results are:
1- Desi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
Enhancing LSB algorithm against brute-force attack using ASCII mapping technique
...Show More Authors

Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Preparation ultra fine particles from Ceramic refractory material using CO2 Laser
...Show More Authors

S a mples of compact magnesia and alumina were evaporated
using CO2-laser .The
Processed powders were characterized by electron microscopy
and both scanning and transmission electron microscope. The results
indicated that the particle size for both powders have reduced largely
to 0.003 nm and 0.07 nm for MgO and Al2O3, with increasing in
shape sphericity.

View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref