Preferred Language
Articles
/
jbcd-1136
An Evaluation of Gutta-Percha Penetration Depth into Simulated Lateral Canals by Using Three Different Obturation Techniques (A Comparative Study)
...Show More Authors

Background:sThe aims of this study were to evaluate and compare the ability of three different techniques to obdurate simulated lateral canals, evaluate the effect of the main canal curvature on obturation of lateral canals and compare the gutta-percha penetration between coronal and apical lateral canals. Materials and methods: Resin blocks with 30 straight and 30 curved were used in this study. Each canal has two parallel lateral canals. The main canal has 0.3 mm apical diameter and 0.04 taper. The canals were divided into six groups according to canal curvature and obturation techniques used (n=10): Groups C1 and C2: straight and curved canals obturated with continuous wave technique using E&Q masterTM system. Groups O1 and O2: straight and curved canals obturated with Obtura II. Groups T1 and T2: straight and curved canals obturated with Thermafil obturators. Soapy water was used to simulate sealer in all obturations performed. The depth of gutta-percha penetration into lateral canals was measured using computerized stereomicroscope. Results: There were very highly significant differences between the obturation techniques at each lateral canal level in both straight and curved canals. Continuous wave using E&Q masterTM system exhibited the greatest gutta-percha penetration into lateral canals with very highly significant difference from both other techniques at majority of lateral canals. There was non- significant difference between Thermafil and Obtura II except at coronal lateral canal of straight main canals where the difference was very highly significant. The gutta-percha depth was greater in coronal than apical lateral canals in all groups of both straight and curved canals, and gutta-percha depth was greater in straight than in curved canals within each obturation technique. Conclusion: This study showed that all the three obturation techniques used were able to obturate simulated lateral canals with the continuous wave technique being the best. Gutta-percha depth was less in the apical than the coronal lateral canals. Canal curvature can influence the gutta-percha depth.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
Watermarking in 3D Models Using Depth Path
...Show More Authors

This paper presents a 3D watermarking model based on the nearest distance between two vertices in mesh, where the embedding path moves as deep as possible until the embedding data is completed. The proposed algorithm achieved good results according to invisibility and robustness. The visibility was measured in term
of Root Mean Square Error (RMSE) and Hausdroff Distance (HD), which obtained good results. As related to robustness, the proposed method showed resistance to geometrical attack (translation, scaling and rotation) as well as acceptable resistance to signal processing attacks like noise addition and simplification.

View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
International Journal Of Research In Social Sciences & Humanities. E-issn
CONCEPTS OF LITERATURE: COMPARATIVE LITERATURE BY HENRY GIFFORD (an Article REVIEW).
...Show More Authors

BOOK REVIEW

Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Comparative Study of Gamma- Ray Shielding Parameters for Different Epoxy Composites
...Show More Authors

In the current work various types of epoxy composites were added to concrete to enhance its effectiveness as a gamma- ray shield. Four epoxy samples of (E/clay/B4C) S1, (E/Mag/B4C) S2, (EPIL) S3 and (Ep) S4 were used in a comparative study of gamma radiation attenuation properties of these shields that calculating using Mont Carlo code (MCNP-5). Adopting Win X-com software and Artificial Neural Network (ANN), µ/ρ revealed great compliance with MCNP-5. By applying (µ/ρ) output for gamma at different energies, HVL, TVL and MFP have been also estimated. ANN technique was simulated to estimate (µ/ρ) and dose rates. According to the results, µ/ρ of all epoxy samples scored higher than standard concrete. Both S2 and S3 samples having h

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an autonomous Mobile Robot using Swarm Based Optimization Techniques
...Show More Authors

This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC

... Show More
View Publication Preview PDF
Crossref (18)
Crossref
Publication Date
Sat Dec 28 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of marginal gap at the composite/enamel interface in Class II composite resin restoration by SEM after thermal and mechanical load cycling (An in vitro comparative study)
...Show More Authors

Background: This study compared in vitro the marginal adaptation of three different, low shrink, direct posterior composites Filtekâ„¢ P60 (packable composite), Filtekâ„¢ P90 (Silorane-based composite) and Sonic fillâ„¢ (nanohybrid composite) at three different composite/enamel interface regions (occlusal, proximal and gingival regions) of a standardized Class II MO cavity after thermal changes and mechanical load cycling by scanning electron microscopy. Materials and methods:Thirty six sound human maxillary first premolars of approximately comparable sizes were divided into three main groups of (12 teeth) in each according to the type of restorative material that was used: group (A) the teeth were restored with Filtekâ„¢ P6

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 28 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of tissue displacement in posterior palatal seal area with different impression techniques with varying palatal forms
...Show More Authors

Background: This study was designed to measure the displacement pattern of posterior palatal seal (pps) area in different forms of the palate and with different impression techniques. Materials and method: This study was used to measure the displacement pattern of (pps)in different palatal shapes by using different impression materials Korrecta wax No.4,Green compound and design of House for pps for each palatal forms by using a 3D Scanner of CAD/CAM and measuring the distance between 2 points in pps area by using Caural Threw. Result: The results show highly significant differences between these techniques and the control group (impression with light body) Conclusion: The physiological impression technique of pps with Korecta wax no.4

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Wed Aug 28 2019
Journal Name
Journal Of Engineering
Evaluation of Heavy Metals Content in Simulated Solid Waste Food Compost
...Show More Authors

Composting is one of the solid waste management (SWM) methods where the organic component decomposed biologically under controlled conditions. In this study, a 0.166 m3 bioreactor tank was designed to compose 59.2Kg of simulated common municipal solid food waste having a bulk density, organic matter, organic carbon, pH, nitrogen content, C/N and nitrification index (NH4-N/ NO3-N) of 536.62 kg/m3, 62.34%, 34.76%, 6.53, 1.86%, 23 and 0.34 respectively. The bioreactor operated aerobically for 30 days, and anaerobically for 70 days, until the end of the composting process. Results proved that the composting process could reduce the mass of the waste by 69%.  Nitrogen content,

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Dec 10 2018
Journal Name
Day 1 Mon, December 10, 2018
Wellbore Trajectory Optimization Using Rate of Penetration and Wellbore Stability Analysis
...Show More Authors

Drilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.

In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation

... Show More
View Publication