Background:sThe aims of this study were to evaluate and compare the ability of three different techniques to obdurate simulated lateral canals, evaluate the effect of the main canal curvature on obturation of lateral canals and compare the gutta-percha penetration between coronal and apical lateral canals. Materials and methods: Resin blocks with 30 straight and 30 curved were used in this study. Each canal has two parallel lateral canals. The main canal has 0.3 mm apical diameter and 0.04 taper. The canals were divided into six groups according to canal curvature and obturation techniques used (n=10): Groups C1 and C2: straight and curved canals obturated with continuous wave technique using E&Q masterTM system. Groups O1 and O2: straight and curved canals obturated with Obtura II. Groups T1 and T2: straight and curved canals obturated with Thermafil obturators. Soapy water was used to simulate sealer in all obturations performed. The depth of gutta-percha penetration into lateral canals was measured using computerized stereomicroscope. Results: There were very highly significant differences between the obturation techniques at each lateral canal level in both straight and curved canals. Continuous wave using E&Q masterTM system exhibited the greatest gutta-percha penetration into lateral canals with very highly significant difference from both other techniques at majority of lateral canals. There was non- significant difference between Thermafil and Obtura II except at coronal lateral canal of straight main canals where the difference was very highly significant. The gutta-percha depth was greater in coronal than apical lateral canals in all groups of both straight and curved canals, and gutta-percha depth was greater in straight than in curved canals within each obturation technique. Conclusion: This study showed that all the three obturation techniques used were able to obturate simulated lateral canals with the continuous wave technique being the best. Gutta-percha depth was less in the apical than the coronal lateral canals. Canal curvature can influence the gutta-percha depth.
This paper presents a 3D watermarking model based on the nearest distance between two vertices in mesh, where the embedding path moves as deep as possible until the embedding data is completed. The proposed algorithm achieved good results according to invisibility and robustness. The visibility was measured in term
of Root Mean Square Error (RMSE) and Hausdroff Distance (HD), which obtained good results. As related to robustness, the proposed method showed resistance to geometrical attack (translation, scaling and rotation) as well as acceptable resistance to signal processing attacks like noise addition and simplification.
BOOK REVIEW
In the current work various types of epoxy composites were added to concrete to enhance its effectiveness as a gamma- ray shield. Four epoxy samples of (E/clay/B4C) S1, (E/Mag/B4C) S2, (EPIL) S3 and (Ep) S4 were used in a comparative study of gamma radiation attenuation properties of these shields that calculating using Mont Carlo code (MCNP-5). Adopting Win X-com software and Artificial Neural Network (ANN), µ/ρ revealed great compliance with MCNP-5. By applying (µ/ρ) output for gamma at different energies, HVL, TVL and MFP have been also estimated. ANN technique was simulated to estimate (µ/ρ) and dose rates. According to the results, µ/ρ of all epoxy samples scored higher than standard concrete. Both S2 and S3 samples having h
... Show MoreThis paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC
... Show MoreBackground: This study compared in vitro the marginal adaptation of three different, low shrink, direct posterior composites Filtekâ„¢ P60 (packable composite), Filtekâ„¢ P90 (Silorane-based composite) and Sonic fillâ„¢ (nanohybrid composite) at three different composite/enamel interface regions (occlusal, proximal and gingival regions) of a standardized Class II MO cavity after thermal changes and mechanical load cycling by scanning electron microscopy. Materials and methods:Thirty six sound human maxillary first premolars of approximately comparable sizes were divided into three main groups of (12 teeth) in each according to the type of restorative material that was used: group (A) the teeth were restored with Filtekâ„¢ P6
... Show MoreBackground: This study was designed to measure the displacement pattern of posterior palatal seal (pps) area in different forms of the palate and with different impression techniques. Materials and method: This study was used to measure the displacement pattern of (pps)in different palatal shapes by using different impression materials Korrecta wax No.4,Green compound and design of House for pps for each palatal forms by using a 3D Scanner of CAD/CAM and measuring the distance between 2 points in pps area by using Caural Threw. Result: The results show highly significant differences between these techniques and the control group (impression with light body) Conclusion: The physiological impression technique of pps with Korecta wax no.4
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreComposting is one of the solid waste management (SWM) methods where the organic component decomposed biologically under controlled conditions. In this study, a 0.166 m3 bioreactor tank was designed to compose 59.2Kg of simulated common municipal solid food waste having a bulk density, organic matter, organic carbon, pH, nitrogen content, C/N and nitrification index (NH4-N/ NO3-N) of 536.62 kg/m3, 62.34%, 34.76%, 6.53, 1.86%, 23 and 0.34 respectively. The bioreactor operated aerobically for 30 days, and anaerobically for 70 days, until the end of the composting process. Results proved that the composting process could reduce the mass of the waste by 69%. Nitrogen content,
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show More