Background: The purpose of this study was to evaluate and compare centering ability and canal transportation of simulated S-shaped canals instrumented with four different types of rotary nickel-titanium systems. Materials and Methods: Forty simulated S-shaped canals in resin blocks were divided into four groups of ten each and were instrumented to an apical size 25 by different instrumentation technique using ProTaper Universal files (group A), ProTaperNext (group B), Reciproc (group C) and WaveOne (group D).Centering ability and canal transportation was measured at (11) measuring points from D0 to D10 bysuperimposion of the pre- and post-operative images obtained by using digital camera in standardized manner. An assessment of the canals shape was determined using Photoshop CS2 and AutoCAD software. The data were analyzed statistically using ANOVA and LSD test. Results: In terms of centering ratio values, there was no statistically significant difference among the four groups at the coronal portion of the canals, with ProTaper system showing the least centering ability at all levels except at apical foramen. At the apical curvature, the Reciproc and WaveOne groups showed better centering ability than ProTaperNext and the difference was statistically highly significant among them at these points, while at the coronal curvature the ProTaperNext showed better centering ability than Reciproc and WaveOne. Canal transportation was seen in all groups but the ProTaper systems showed more transportation values at almost levels when compared with the other groups with the least values by ProTaperNext at the coronal curvature and the least values by Reciproc and WaveOne at the apical curvature. Conclusions: Under the conditions of this study, ProtaperNext ,WaveOne and Reciproc instruments maintained the original curvature significantly better than ProTaperUniversal at almost levels. ProtaperNext showed a better shaping ability than Reciproc and WaveOne at the coronal curved section while at apical curved section Reciproc and WaveOne showed a better shaping ability than ProtaperNext. Key words: centering ability, canal transportation, ProTaperNext, Reciproc, WaveOne.
Abstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreThe objective of this study is to evaluate the efficacy and safety of rowatinex and tamsulosin in the treatment of patients with ureteric stone.
Forty patients with ureteric stone ranged (4- 12) mm, were included in this study. They were randomized into two groups where the first group includes twenty patients treated with Rowatinex three times daily (Group 1), and the second group includes twenty patients treated with tamsulosin 0.4mg/day (Group 2). All patients were randomly assigned to receive the designed standard medical therapy for a maximum of 3 weeks.
Each group was given an antibiotic as prophylaxis and an injectable non-steroidal anti-inflammatory drug used on demand. At the outpatient clinic all subjects were a
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreRotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More