Background: In the Thermafil as a root canal obturation, system little is known about the effect that varying rates of insertion have on the adaptability of thermoplasticized GP and the amount of apical extrusion. Materials and methods: thirty simulated root canals were obturated with thermafil obturators and Apexit Plus sealer at three different insertion rates. The obturated canals were sectioned at three different levels, the sealer average film thickness for each section was calculated and the amount of apical extrusion for each canal was conducted. Results: the higher adaptability was seen with the faster insertion rate while the slower insertion rate showed fewer tendencies to cause apical extrusion. Conclusions: the intermediate insertion rate had the best results between the other two rates for both adaptability and apical extrusion.
Background: Polycystic ovary syndrome (PCOS) has an unknown and complex etiology. It affects 5–10% of women in the reproductive age. Patients are known to have increased ovarian androgen production that is associated with decreased menses, hirsutism, and acne. Urinary tract stones (UTS) are a multifactorial disorder, with age and sex being known risk factors. Many PCOS patients are obese, and links between nephrolithiasis and obesity have been shown previously. Objectives: To identify the relation between PCOS and UTS considering the patients' body mass index (BMI). Methods: This is a cross-sectional study that enrolled 407 women aged 18-40 who attended the gynecology and obstetrics clinic at Al-Elwiya Maternity Teaching Hospital.
... Show More1,3,4-oxadizole and pyrazole derivatives are very important scaffolds for medicinal chemistry. A literature survey revealed that they possess a wide spectrum of biological activities including anti-inflammatory and antitumor effects.
To describe the synthesis and evaluation of two classes of new niflumic acid (NF) derivatives, the 1,3,4-oxadizole derivatives (compounds 3 and (4A-E) and pyrazole derivatives (compounds 5 and 6), as EGFR tyrosine kinase inhibitors in silico and in vitro.
The designed compounds were synthesized using convent
Field experiment conducted to measure vibrations on three axes longitudinal X, lateral Y and vertical Z on steering wheel, platform tractor and vertical vibration in seat tractor and seat effective amplitude transmissibility (SEAT) factor during operation tillage in silt clay loam soil with depth 18 cm in Baghdad. Split – split plot design under randomized complete block design with three replications least significant design 5 % used. Three factor were used in this experiment included two types of plows included chisel and disc plows which represented main plot, three tires inflation pressure was second factor included 1.1 ,1.8 and 2.7 bar, and three forward speeds of the tillage was third factor included 2.35 , 4.25 and 6.50 km/hr. Resu
... Show MoreModerately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreFlow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More