Background: Antibacterial action of root canal filling is an important factor for successful root canal treatment, so the aim of the study was to identify and to compare the antimicrobial effect of new sealer (GuttaFlow) to commonly used endodontic sealers (AH Plus, Apexit and EndoFill) against four endodontic microbes. Materials and methods: Twenty patients aged (30-40) years with infected root canals were selected. Four types of microorganisms were isolated from root canals (E faecalis, Staphylococcus aureus, E coli and Candida albicans) and cultured on Mueller Hinton agar Petri-dishes. After identification and isolation of bacterial species, agar diffusion method was used to assess the antibacterial action of four contemporary endodontic sealers used in root canal obturation (AH Plus, Apexit, EndoFill and GuttafFlow). Four wells measuring (5mm depth and 4mm diameter) were created in each Petri dish and sealer was applied into them incubated overnight at 37 C° for bacterial species and 48 hr. at 37 C° for Candida albicans prior to determination of results. Zones of inhibition (no growth of bacteria) were examined around the wells containing sealer & diameters of the zones were measured in mm. The mean of inhibition zones for each group was measured and statistically analyzed among groups using ANOVA and between groups using LSD tests. Results: There was a highly significant difference (P<0.001) among all the tested groups. EndoFill showed the maximum antibacterial action against tested microorganisms. GuttaFlow showed moderate to weak antimicrobial effect, Apexit had weak effect, while AH Plus had no antibacterial action. Conclusion: All the tested materials except AH Plus had antibacterial efficacy against E faecalis, Staphylococcus aureus, E coli and Candida albicans. EndoFill had favorable results among tested sealers and E faecalis was the most resistant bacteria, but none of the materials totally inhibited microbial growth. Thus, endodontic treatment must be performed under aseptic conditions.
In this work, plasma parameters such as, the electron temperature )Te(, electron density ne, plasma frequency )fp(, Debye length )λD(
and Debye number )ND), have been studied using optical emission spectroscopy technique. The spectrum of plasma with different values of energy, Pb doped CuO at different percentage (X=0.6, 0.7, 0.8) were recorded. The spectroscopic study for these mixing under vacuum with pressure down to P=2.5×10-2 mbar. The results of electron temperature for X=0.6 range (1.072-1.166) eV, for X=0.7 the Te range (1.024-0.855) eV and X=0.8 the Te is (1.033-0.921) eV. Optical properties of CuO:Pb thin films were determined through the optical transmission method using ultraviolet visible spectrophotometer within the ra
Sheikh Hanafi was born in one of the popular shops of Baghdad with interlocking social relations, and had a profound impact this camp where his talents in the first Venco loving to Mahalah and Baghdad and was born with this development since his days looked forward to the folklore and folk. In the middle of his youth, including authoring loves the heritage of folk legacies began in motion, from Baghdad, books, articles, research has brought him wide acclaim were not possible without the seriousness and diligence, independence and self-Asamath that mushroom on them
The trip was one of his tools in the scientific fame has gone to many Eastern and Asian countries and visited religious and literary institutes and delivered the lectures an
In this work, plasma parameters such as (electron temperature (Te), electron density (ne), plasma frequency (fp) and Debye length (λD)) were studied using spectral analysis techniques. The spectrum of the plasma was recorded with different energy values, SnO2 and ZnO anesthetized at a different ratio (X = 0.2, 0.4 and 0.6) were recorded. Spectral study of this mixing in the air. The results showed electron density and electron temperature increase in zinc oxide: tin oxide alloy targets. It was located that The intensity of the lines increases in different laser peak powers when the laser peak power increases and then decreases when the force continues to increase.
Background: Understanding the challenges facing nurses toward providing care to patients with cerebrovascular accidents is the initial step in developing strategies to address these challenges, thereby ensuring high-quality care. Aim: The study aimed to assess the challenges experienced by nurses in delivering care to patients with CVAs in neurological wards. Results: Of the 80 questionnaire participants in the qualitative part, (MS = 0.66) reported a "moderate" rating as an overall assessment. These challenges are divided into workload (MS = 0.53) at a moderate rate, the psychological burden (MS = 0.85) at a high rate, the supporting materials (MS = 0.85) at a high rate, the sense of responsibility (MS = 0.77) at a high rate, and the role
... Show MoreThe current research aimed to analyze the importance, correlation and the effect of independent variables represented by marketing variables on the dependent variable represented by local brand, through taking ENIEM as a model for this study, which represents a sensitive sector for the Algerian consumer. The results of the study evinced that the Algerian consumer has a positive image toward the brand ENIEM given marketing variables which has acquired considerable importance to this consumer. Also, the results of this study showed a statistically significant correlation between marketing variables and good perception toward the brand ENIEM, at the same time, the existence of a statistically significant effect for each of these variables o
... Show MoreThe present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc. A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.
The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary
... Show MoreThis research aims to solve the problem of selection using clustering algorithm, in this research optimal portfolio is formation using the single index model, and the real data are consisting from the stocks Iraqi Stock Exchange in the period 1/1/2007 to 31/12/2019. because the data series have missing values ,we used the two-stage missing value compensation method, the knowledge gap was inability the portfolio models to reduce The estimation error , inaccuracy of the cut-off rate and the Treynor ratio combine stocks into the portfolio that caused to decline in their performance, all these problems required employing clustering technic to data mining and regrouping it within clusters with similar characteristics to outperform the portfolio
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More