Background: Antibacterial action of root canal filling is an important factor for successful root canal treatment, so the aim of the study was to identify and to compare the antimicrobial effect of new sealer (GuttaFlow) to commonly used endodontic sealers (AH Plus, Apexit and EndoFill) against four endodontic microbes. Materials and methods: Twenty patients aged (30-40) years with infected root canals were selected. Four types of microorganisms were isolated from root canals (E faecalis, Staphylococcus aureus, E coli and Candida albicans) and cultured on Mueller Hinton agar Petri-dishes. After identification and isolation of bacterial species, agar diffusion method was used to assess the antibacterial action of four contemporary endodontic sealers used in root canal obturation (AH Plus, Apexit, EndoFill and GuttafFlow). Four wells measuring (5mm depth and 4mm diameter) were created in each Petri dish and sealer was applied into them incubated overnight at 37 C° for bacterial species and 48 hr. at 37 C° for Candida albicans prior to determination of results. Zones of inhibition (no growth of bacteria) were examined around the wells containing sealer & diameters of the zones were measured in mm. The mean of inhibition zones for each group was measured and statistically analyzed among groups using ANOVA and between groups using LSD tests. Results: There was a highly significant difference (P<0.001) among all the tested groups. EndoFill showed the maximum antibacterial action against tested microorganisms. GuttaFlow showed moderate to weak antimicrobial effect, Apexit had weak effect, while AH Plus had no antibacterial action. Conclusion: All the tested materials except AH Plus had antibacterial efficacy against E faecalis, Staphylococcus aureus, E coli and Candida albicans. EndoFill had favorable results among tested sealers and E faecalis was the most resistant bacteria, but none of the materials totally inhibited microbial growth. Thus, endodontic treatment must be performed under aseptic conditions.
A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreThis paper aims to study the second-order geometric nonlinearity effects of P-Delta on the dynamic response of tall reinforced concrete buildings due to a wide range of earthquake ground motion forces, including minor earthquake up to moderate and strong earthquakes. The frequency domain dynamic analysis procedure was used for response assessment. Reinforced concrete building models with different heights up to 50 stories were analyzed. The finite element software ETABS (version 16.0.3) was used to analyze reinforced concrete building models.
The study reveals that the percentage increase in buildings' sway and drift due to P-Delta effects are nearly constant for specific building height irrespective of the seism
... Show MoreIn this paper, a numerical model for fluid-structure interaction (FSI) analysis is developed for investigating the aeroelastic response of a single wind turbine blade. The Blade Element Momentum (BEM) theory was adopted to calculate the aerodynamic forces considering the effects of wind shear and tower shadow. The wind turbine blade was modeled as a rotating cantilever beam discretized using Finite Element Method (FEM) to analyze the deformation and vibration of the blade. The aeroelastic response of the blade was obtained by coupling these aerodynamic and structural models using a coupled BEM-FEM program written in MATLAB. The governing FSI equations of motion are iteratively calculated at each time step, through exchanging data between
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreThe thermal and electrical performance of different designs of air based hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and
... Show MoreTo investigate the prevalence of true periodontal chief complaints (CC) and the factors affecting their reporting by patients with periodontal diseases (PD).
This cross‐sectional study was based on retrospective analysis of available periodontal records. Different personal and demographic variables were obtained from these records including CC, age, gender, working status, past medical/dental history, smoking status and diagnosis. In addition, clinical parameters of plaque index, gingival index, probing pocket depth (PPD), and number of missing teeth. Periodontal CC were r
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn this paper, a least squares group finite element method for solving coupled Burgers' problem in 2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved. The theoretical results show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the effic
... Show More