Background: The change in the concepts of cavity preparation and the development of reliable adhesive materials lead to the development of alternative methods of caries removal. Chemo-mechanical caries removal (CMCR) involves the chemical softening of carious dentin, followed by its removal with manual excavation. The present study was conducted to evaluate clinically the efficiency of caries removal using a new chemo-mechanical agent (Papacarie) compared to the conventional drilling method in reduction of total bacterial count. Material and methods: The study is a split mouth design. The sample composes from sixty mandibular deciduous molars teeth in thirty children, between six to nine years of age with bilateral class I deep occlusal carious lesions without pulp involvement. Samples of this study were classified into group A and B with thirteen teeth for each. In groupAtreatment by Papacárie while group B were treated by the conventional drilling method Results: The results showed significant different in total bacterial count in period after treatment with Papacarie as comparative with drill method for caries remove. Conclusions: It was concluded that Papacarie could be an effective caries removal method to treat children, particularly those who present with early childhood caries or management problems.
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
A loS.sless (reversible) data hiding (embedding) method inside an image (translating medium) - presented in the present work using L_SB (least significant bit). technique which enables us to translate data using an image (host image), using a secret key, to be undetectable without losing any data or without changing the size and the external scene (visible properties) of the image, the hid-ing data is then can be extracted (without losing) by reversing &n
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreIn this investigation, metal matrix composites (MMCs) were manufactured by using powder technology. Aluminum 6061 is reinforced with two different ceramics particles (SiC and B4C) with different volume fractions as (3, 6, 9 and 12 wt. %). The most important applications of particulate reinforcement of aluminum matrix are: Pistons, Connecting rods etc. The specimens were prepared by using aluminum powder with 150 µm in particle size and SiC, B4C powder with 200 µm in particle size. The chosen powders were mixed by using planetary mixing setup at 250 rpm for 4hr.with zinc stearate as an activator material in steel ball milling. After mixing process the powders were compacted by hydraulic
... Show MoreThis study discussed a biased estimator of the Negative Binomial Regression model known as (Liu Estimator), This estimate was used to reduce variance and overcome the problem Multicollinearity between explanatory variables, Some estimates were used such as Ridge Regression and Maximum Likelihood Estimators, This research aims at the theoretical comparisons between the new estimator (Liu Estimator) and the estimators
<p><strong>Objective: </strong>The aim of our study was to compare between flavonoids and phenolic acids contents of leaves and fruits of <em>Melia azedarach</em> since no phytochemical investigation had done previously in Iraq.</p><p><strong>Methods: </strong>The leaves and fruits of <em>Melia azedarach </em>were extracted by soxhlet using 80% ethanol then the dried extract was suspended in water and fractionated using petroleum ether, chloroform, ethyl acetate, and n-butanol. The n-butanol fraction was hydrolyzed by acid and partitioned with ethyl acetate. The different fractions containing flavonoids and phenolic acids were analyzed by HPLC and HPTLC.</p><
... Show MoreIn this paper we have presented a comparison between two novel integral transformations that are of great importance in the solution of differential equations. These two transformations are the complex Sadik transform and the KAJ transform. An uncompressed forced oscillator, which is an important application, served as the basis for comparison. The application was solved and exact solutions were obtained. Therefore, in this paper, the exact solution was found based on two different integral transforms: the first integral transform complex Sadik and the second integral transform KAJ. And these exact solutions obtained from these two integral transforms were new methods with simple algebraic calculations and applied to different problems.
... Show MoreThe information revolution، the new language has become one for all the peoples of the world through handling and exchange and to participate in all key areas (economic، cultural and scientific) and Accounting episode of this revolution has turned most of the traditional systems (manual) in companies to automated systems، this transformation in the regulations summoned from the auditors that develops their traditional examination automated systems so had to provide tools for auditing help auditors to keep abreast of developments and as a result there is no evidence checksum Local Private audited automated systems came search to provide evidence helps auditors for guidance as part of COBIT، which provides audit procedures Detailed inf
... Show More