Preferred Language
Articles
/
jbcd-709
Evaluation of the cleaning efficiency of the isthmus using different rotary instrumentation techniques (In vitro study)
...Show More Authors

Background: The aims of the study were to evaluate the unclean/clean root canal surface areas with a histopathological cross section view of the root canal and the isthmus and to evaluate the efficiency of instrumentation to the isthmus using different rotary instrumentation techniques. Materials and Methods:The mesial roots of thirty human mandibular molars were divided into six groups, each group was composed of five roots (10 root canals)which prepared and irrigated as: Group one A: Protaper system to size F2 and hypodermic syringe, Group one B: Protaper system to size F2 and endoactivator system, Group two A:Wave One small then primary file and hypodermic syringe, Group two B:Wave One small then primary file and endoactivator system, Group three A: step back technique to size 25 file as MAFand hypodermic syringe, Group three B: step back technique to size 25 file as MAFand endoactivator system . All the roots were sectioned at 2mm, 6mm ,12mm from the apex and studied by histopathological cross section. The degree of cleaning of each section was measured by the use of Autocade 2004 software system. Result :the least uncleaned isthmus surface area at coronal, middle and apical section was found by the Protaper system with endoactivator which represented the mean of the percentage of uncleaned surface area of 16.87%, 14.32% and 9.55% respectively. The system that produced least uncleaned canal wall was by Protaper system with endoactivator at coronal ,middle ,and apical sections of 12.21%, 9.14% and 18.55% respectively . The mean of highest percentage of increased canal diameter which was Protaper system, Wave One system and then step back. The comparison between the groups in the means which showed that the highest percentage of decrease in isthmus area was with the Protaper system, Wave One system and lastly the step back. Conclusions:The Protaper system with endoactivator was the best system in canal and isthmus cleaning.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Materials Today: Proceedings
Preparation, characterization and preliminary cytotoxic evaluation of 6-mercaptopurine-coated biotinylated carbon dots nanoparticles as a drug delivery system
...Show More Authors

View Publication
Scopus (21)
Crossref (15)
Scopus Crossref
Publication Date
Fri Jun 30 2017
Journal Name
Journal Of Engineering
Performance Evaluation of a PID and a Fuzzy PID Controllers Designed for Controlling a Simulated Quadcopter Rotational Dynamics Model
...Show More Authors

This work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Paripex - Indian Journal Of Research
Using falling (deep) Jump training units to improve the explosive and characterized by speed forces for the badminton players College of physical education, and sport science for girls College of physical education, and sport science for girls College of physical education, and sport science for girls KEYWORDS
...Show More Authors

The research abstract included introduction and the importance of the research, also included display of the problem represented by weakness for the players when performing some of the basic skills in badminton and the shuttle not reaching to the back corners of the court which gives the player the opportunity to win through applying the pressure on the opponent and make him away from the control center(T) which definitely required level of a collection muscular strength contributed in performance perhaps this related to a number of reasons related with weakness in physical changes especially explosive and characterized by speed forces for the badminton players and be acquainted with them and knowing the extent of their effect in performanc

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Effect of maternal exposure of silver nanoparticles on the histogenesis of cerebellum in post-implantation of albino rats embryos
...Show More Authors

The central nervous system is the most important system and is very sensitive to any accidental infection during ontogenesis; it includes brain and spinal cord. The cerebellum is the second largest part of the brain after cerebrum and it’s very sensitive to the abnormal changes during the embryological development. This study was designed to investigate the effect of the maternal exposure of selected concentrations of suspension of nanoparticles on the ontogenesis of the rat cerebellum after embryos implanted in uterus. A total of 60 female pregnant rats were divided in to three groups, each contains 20 females. Group1 (G1) was treated orally with 2mg/kg /body weight (b. wt) of suspension of silver nanoparticles (Ag NPs). While group 2 (G

... Show More
Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Experience of Kurdistan province of Iraq in light of the development of economic and social indicators for sustainable development
...Show More Authors

Reflect the sustainable development of the interaction of three key elements are the economic component and the social component and the environmental component while focusing economic component to achieve economic growth and focuses social element to achieve social justice in the distribution of income and achieve prosperity, the environmental component related fields and including emphasizes the protection of the environment and to ensure the continuation and sustainability of resources physical, biological and form in which it believes the interaction required for development process real and effective and sustainable, and is considered the province of Kurdistan Iraq of important areas where the movement of developmental mount

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Effect of maternal exposure of silver nanoparticles on the histogenesis of cerebellum in post-implantation of albino rats embryos
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 31 2021
Journal Name
International Journal Of Sustainable Development And Planning
The Crossing as a New Approach for the Urban Transformation of Traditional Cities Towards the Sustainability
...Show More Authors

The topic of urban transformations has attracted the attention of researchers as it is one of the basic issues through which cities can be transformed towards sustainability. A specific level of transformation levels according to a philosophical concept known as a crossing. This article has relied on a specific methodology that aims to find a new approach for urban transformation based on the crossing concept. This concept derives from philosophical entrances based on the concepts of (being, process, becoming, and integration). Four levels have been for the crossing are (normal, ascending, leap, and descending). Each of these levels includes specific characteristics that distinguish it. The results showed that there is no descending

... Show More
View Publication
Scopus (15)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref