Background:sThe aims of this study were to evaluate and compare the ability of three different techniques to obdurate simulated lateral canals, evaluate the effect of the main canal curvature on obturation of lateral canals and compare the gutta-percha penetration between coronal and apical lateral canals. Materials and methods: Resin blocks with 30 straight and 30 curved were used in this study. Each canal has two parallel lateral canals. The main canal has 0.3 mm apical diameter and 0.04 taper. The canals were divided into six groups according to canal curvature and obturation techniques used (n=10): Groups C1 and C2: straight and curved canals obturated with continuous wave technique using E&Q masterTM system. Groups O1 and O2: straight and curved canals obturated with Obtura II. Groups T1 and T2: straight and curved canals obturated with Thermafil obturators. Soapy water was used to simulate sealer in all obturations performed. The depth of gutta-percha penetration into lateral canals was measured using computerized stereomicroscope. Results: There were very highly significant differences between the obturation techniques at each lateral canal level in both straight and curved canals. Continuous wave using E&Q masterTM system exhibited the greatest gutta-percha penetration into lateral canals with very highly significant difference from both other techniques at majority of lateral canals. There was non- significant difference between Thermafil and Obtura II except at coronal lateral canal of straight main canals where the difference was very highly significant. The gutta-percha depth was greater in coronal than apical lateral canals in all groups of both straight and curved canals, and gutta-percha depth was greater in straight than in curved canals within each obturation technique. Conclusion: This study showed that all the three obturation techniques used were able to obturate simulated lateral canals with the continuous wave technique being the best. Gutta-percha depth was less in the apical than the coronal lateral canals. Canal curvature can influence the gutta-percha depth.
A new series of metal ions complexes of VO(II), Cr(III), Mn(II), Zn(II), Cd(II) and Ce(III) have been synthesized from the Schiff bases (4-chlorobenzylidene)-urea amine (L1) and (4-bromobenzylidene)-urea amine (L2). Structural features were obtained from their elemental microanalyses, magnetic susceptibility, molar conductance, FT-IR, UV–Vis, LC-Mass and 1HNMR spectral studies. The UV–Vis, magnetic susceptibility and molar conductance data of the complexes suggest a tetrahedral geometry around the central metal ion except, VOII complexes that has square pyramidal geometry, but CrIII and CeIII octahedral geometry. The biological activity for the ligand (L1) and its Vanadium and Cadmium complexes were studied. Structural geometries of com
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreIn recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More