Background: Many types of instruments and techniques are used in the instrumentation of the root canal system. These instruments and techniques may extrude debris beyond the apical foramen and may cause post-instrumentation complications. The aim of this study was to evaluate the amount of apically extruded debris resulted by using 4 types of nickel-titanium instruments (WaveOne, TRUShape 3D conforming files, Hyflex CM, and One Shape files) during endodontic instrumentation. Materials and methods: Forty freshly extracted human mandibular second premolar with straight canals and a single apex were collected for this study. All teeth were cut to similar lengths. Pre-weighted glass vials were used as collecting containers. Samples were randomly divided into four groups with 10 samples in each group: Group A instrumentation by WaveOne reciprocating file, Group B instrumentation by TRUShape 3D rotating files, Group C instrumentation by Hyflex CM rotating files and Group D instrumentation by One Shape rotating file. A total volume of 7 ml of sodium hypochlorite was used for irrigation in each sample. Apical patency confirmed and maintained by a size #15 K-File. All canals were instrumented up to a size #25. After completion of endodontic instrumentation, vials were then stored in an incubator for 5 days at 68o C for dryness. Then vials are weighted again, and the pre-weight subtracted from the post-weight, the weight difference resembled the amount of apically extruded debris from the apical foramen during root canal instrumentation. Data obtained were statistically analysed by using ANOVA and LSD tests. Results: The results showed that the Hyflex CM Group (C) has statistical significant lowest apically extruded debris as compared to other groups of this study (P ≤0.05), while the TRUShape Group (B) has statistical significant lowest apically extruded debris as compared to One Shape Group (D) and WaveOne Group (A), while the WaveOne Group (A) showed the highest value of apically extruded debris (p ≤0.01). The result showed that all groups resulted in apical extrusion of debris. Significance: Although all systems caused apical extrusion of debris and irrigant, continuous rotary instrumentation was associated with less extrusion as compared with the use of reciprocating file system.
The research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
This work aimed to design and testing of a computer program – based eyeQ improvement, photographic memory enhancement, and speed reading to match the reading speed 150 – 250 word per minute (WPM) with the mind ability of processing and eye snap shooting 5000WPM . The package designed based on Visual Basic 6. The efficiency of the designed program was tested on a 10 persons with different levels of education and ages and the results show an increase in their reading speed of approximately 25% in the first month of training with noticeable enhancement in the memory as well as an increase in the ability to read for longer time without feeling nerves or boring, a nonlinear continuously increase in reading speed is assured after the first mo
... Show MoreAbstract
Value Added Tax (VAT) is one of the most important types of indirect taxes because of its advantages in achieving financial, economic and financial objectives. The introduction of VAT is part of the reform of the structure of the Lebanese public tax system aimed at reducing the fiscal deficit and resulting inflation, which still lacks a general consumption tax. There is also an urgent need to increase treasury revenues , Because of its broad tax base, as it imposes on the consumption of locally produced and imported goods, in addition to the role played by this tax in support of the local product &nbs
... Show MoreThe aim of the research is to know the effect of financial leverage on the market value of the stock by applying it to a sample of private Iraqi commercial banks listed in the Iraqi Stock Exchange for the period (2010-2019) and to show the extent of that effect, based on the bank’s annual reports for the mentioned period through the use of financial leverage ratios represented b (Equity multiplier, cash balance ratio), its discussion, analysis, description, inferential description, and testing of research hypotheses,
A set of conclusions has been reached, the most important of which are: The research sample banks depend in their financial structures on borrowed funds in a greater proportion than their r
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More