Background: Sealers should demonstrate adhesive properties to dentin, decreasing the chance of endodontic treatment failure. Increased adhesive properties to dentin may lead to greater strength of the restored tooth, which may provide greater resistance to tooth fracture and clinical longevity of an endodontically treated tooth. The aim of this study was to evaluate the shear bond strength of Bioceramic iRoot SP sealer, AH plus sealer and Apexit plus sealer in absence or presence of smear layer using push out bond strength test. Materials and Methods: Sixty straight single roots of the mandibular premolars were selected for this study. All canals were instrumented using ProTaper rotary instruments to achieve tapered canal walls, instrumentation was done with copious irrigation of 5.25% sodium hypochlorite. Roots were randomly divided into three groups according to the type of sealer used (twenty teeth for each group): Group A: Apexit plus + gutta percha, Group B: AH plus sealer + gutta percha, Group C: iRoot SP sealer + gutta percha .Then groups were subdivided according to types of final irrigation into two subgroups. Groups (A1, B1, and C1) were irrigated with 5 ml of 5.25% NaOCl for 1 minute while Groups (A2, B2, and C2), the smear layer was removed with 5 ml of 17% EDTA for 1 minute. All groups were rinsed with distilled water and then obturated with cold lateral condensation technique, the roots then stored in moist environment at 37°C for one week. The roots were embedded in clear acrylic resin and three horizontal sections were prepared at a thickness of 1 mm ±0.1 in the apical, middle and coronal parts of each root. The test specimens were subjected to the push-out test method using a Universal Test Machine that carried 1-mm, 0.5- mm and 0.3-mm plungers for coronal, middle and apical specimens, respectively. The loading speed was 0.5 mm/ min. The computer showed the higher bond force before dislodgment of the filling material. These forces were divided by the surface area to obtain the bond strength in MPa. Results: The results showed that the bond strengths of iRoot SP and AH Plus were significantly higher than those of Apexit plus, but there was no significant difference between the bond strength of iRoot SP and AH Plus.In terms of root segments, the bond strengths in the middle specimens and the apical specimens were higher compared with the bond strengths in the coronal specimens. Conclusion: The presence or absence of smear layer did not significantly affect the bond strength of Bioceramic filling materials.
Three types of zeolite A were prepared from Iraqi kaoline which are 3A, 4A and 5A by ion exchange method .They were characterized by XRD and atomic absorption techniques .They were used as adsorbents to examine their applicability for H2S adsorption .The adsorption process was performed in a static form and constant volume system which constructed from stainless steel .The effect of zeolite type and temperature on the adsorption properties of H2S at -5 , 25 and 55 oC was studied .The zeolite type 5A has the highest adsorption value (79.384 µmol/g ) and the three types may be arranged in a sequence toward H2S adsorption as 5 A> 4A>3A .The amount of H2S adsorbed increased as temperature decreased from 55 to -5 for all samples. Langmuir , Fre
... Show MoreThe purpose of this study is to evaluate the effect of hydrated lime addition methods as filler replacement on fatigue performance of Hot Mix Asphalt (HMA). Three types of addition methods of hydrated lime were introduced namely dry HL on dry aggregate and saturated surface aggregate above 3% and slurry HL on dry aggregate, ordinary Lime stone powder was reduced by three HL percentage (1.0, 2.0 and 3.0 %). The effect of different methods were investigated on the fatigue properties of HMA using, third-point flexural fatigue bending Test. Pneumatic Repeated Load System (PRLS) was carried out to establish the effect of hydrated lime on the fatigue failure criteria and to select the proper hydrated lime application methods on fatigue behavior o
... Show MoreBackground and Objectives:
Poisoning is an important cause of childhood and adolescence hospital emergency presentations and admissions and a major health problem in this population sector. The
present study was designed to describe the epidemiology and pattern of poisoning in addition to its case fatality rate.
Methods:
A total of 1450 pediatric cases with poisoning admitted to the Central Teaching Hospital of Pediatrics, Baghdad, during the 10 years study period extending from the 1st of
January 1993 to 31st of December 2002, were analyzed.
Results:
The peak age for poisoning cases in the present study was 1-4 years, constituting about three quarters of total pediatric admissions with poisoning.
The aim of this research is to study some functional properties and the antioxidant activity of cherry gum, collected from Serghaya and Suwayda in Syria, and to compare these features with those of Arabic gum. The values of the hydroxyl groups for the Arabic gum, Serghaya and Suwayda cherry gums were 757.1, 655.1 and 564.3 mg KOH/gm, respectively. The solubility of exudate gums ranged from 53.53 to 86.53% and was arranged as follows: Arabic gum>Serghaya cherry gum >Suwayda cherry gum. Gum solubility increased with rising the temperature. Water and oil holding capacities of cherry gums were significantly higher (p<0.05) than those of Arabic gum, while their emulsifying capacity was significantly lower than that of Arabic gum. The
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreThis Research deals with estimation the reliability function for two-parameters Exponential distribution, using different estimation methods ; Maximum likelihood, Median-First Order Statistics, Ridge Regression, Modified Thompson-Type Shrinkage and Single Stage Shrinkage methods. Comparisons among the estimators were made using Monte Carlo Simulation based on statistical indicter mean squared error (MSE) conclude that the shrinkage method perform better than the other methods
The current research seeks to identify the role of the marketing intelligence system in its dimensions (customer intelligence, market intelligence, competitor intelligence, insurance product intelligence, sales representatives) and its reflection on improving the quality of the insurance service provided by the National Insurance Company represented in its dimensions (reliability, response, tangibility, Safety, the spirit of empathy, communication) adopted in the current research, and based on that, the research came as an attempt to find out the extent to which the research sample company can apply the approach of the marketing intelligence system and its impact on improving the quality of the insurance service provided to custo
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show More