Background: Removal of bacteria from the pulp system by instrumentation of an infected root canal, will be significantly reduced the number of bacteria, but it is well documented that instrumentation alone can-not clean and kill all bacteria found on the root canal walls. Antibacterial irrigants are needed to kill the remaining microorganisms. The aims of this study was to assess antibacterial effect of titanium tetrafluoride (TiF4) solution and brewing green tea against root canal bacteria and to compare with sodium hypochlorite and normal saline through microbiological and molecular studies. Materials and methods: Microbiological study was carried out to determine the concentration of titanium tetrafluoride and brewing green tea at which they exert antibacterial effect against ten swabs that had been taken from necrotic root canals that were incubated aerobically and anaerobically by paper disk diffusion test, whilemolecular study carried out among Forty children in which the antibacterial effect of titanium tetrafluoride and brewing green tea compared with sodium hypochlorite and normal saline were assessed by real time polymerase chain reaction using SYBR Green. Results: The microbiological study results showed that TiF4 achieved maximum antibacterial effect at concentration 5% against aerobic and anaerobic bacteria while green tea exhibited antibacterial effect when brewed for 20 minutes at concentration 100mg/1ml against staphylococcus aureus, but not active against other microorganisms like Escherichia coli and streptococcus. While results of molecular study illustrated that sodium hypochlorite remained the most effective endodontic irrigant solutions followed by titanium tetrafluoride then green tea while normal saline showed no antibacterial effect. Statistically titanium tetrafluoride, green tea and sodium hypochlorite have significant differences compared to normal saline. Conclusions: This study revealed that, titanium tetra fluoride and brewing green tea can be used as antibacterial irrigant solutions for root canal treatment in children.
A field experiment was carried out at University of Baghdad, College of Agricultural Engineering Sciences during fall season of 2020 and spring season of 2021. This study was aimed evaluate the effect of the organic fertilizer and boron foliar on the yield of potatoes for processing. The factorial experiment (5*4) within RCBD and three replicates. The organic fertilizer as palm peat at four levels (0, 12, 24 and 36 ton. ha-1) in addition to the chemical fertilizer recommendation treatment. Boron at four Concentrations 0, 100, 150 and 200 mg. L-1 . The results revealed significant different among application of organic fertilizer at the level of 24 ton. ha-1 and the foliar application of boron at a concentration of 100 mg. L-1 in the
... Show MoreThe Sequencing Batch Reactor system (SBR) is a major component of the municipal wastewater biological treatment system and water reclamation that provides high-quality water that could be reused in restricted plants that which require large quantities of water despite the lack of water. The research aims to investigate the performance of a pilot plant SBR unit under real operation conditions that was installed and operated in Al-Rustamiya Wastewater Treatment Plant (WWTP), Baghdad, Iraq. Results showed that the BOD5/COD ratio of the raw wastewater was within the average value at 0.66 emphasizing the organic nature of the influent flow and hence the amenability to biological treatment. The results also ensured that the treatment pro
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreTaking into account the significance of food chains in the environment, it demonstrates the interdependence of all living things and has economic implications for people. Hunting cooperation, fear, and intraspecific competition are all included in a food chain model that has been developed and researched. The study tries to comprehend how these elements affect the behavior of species along the food chain. We first examined the suggested model's solution properties before calculating every potential equilibrium point and examining the stability and bifurcation nearby. We have identified the factors that guarantee the global stability of the positive equilibrium point using the geometric approach. Additionally, the circumstances that would gu
... Show MoreThis article examines and proposes a dietary chain model with a prey shelter and alternative food sources. It is anticipated that mid-predators' availability is positively correlated with the number of refuges. The solution's existence and exclusivity are examined. It is established that the solution is bounded. It is explored whether all potential equilibrium points exist and are locally stable. The Lyapunov approach is used to investigate the equilibrium points' worldwide stability. Utilizing a Sotomayor theorem application, local bifurcation is studied. Numerical simulation is used to better comprehend the dynamics of the model and define the control set of parameters.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreTo achieve sustainability, use waste materials to make concrete to use alternative components and reduce the production of Portland cement. Lime cement was used instead of Portland cement, and 15% of the cement's weight was replaced with silica fume. Also used were eco-friendly fibers (copper fiber) made from recycled electrical. This work examines the impact of utilizing sustainable copper fiber with different aspect ratios (l/d) on some mechanical properties of high-strength green concrete. A high-strength cement mixture with a compressive strength of 65 MPa in line with ACI 211.4R was required to complete the assignment. Copper fibers of 1% by volume of concrete were employed in mixes with four different aspect ratios
... Show MoreWe studied in this research how to find a method of estimating the quantity (Kinetically) of three kinds of Insecticide and their mixture, which are used in agriculture. The extracted insecticide from the polluted samples with these insect from air, soil, and the leaves of trees, have be used into the reaction with H2O2 and benzedine. The kinetic study of this reaction was formed in basic medium,( pH= 8.6), using UV. Spectra at (?= 420nm). The study showed that the reaction is the first order, and the speed of the reaction was used to estimate the concentration of insecticide in solution and mixture. The experiments of this study indicated that this method has the speed and efficiency for quantitatively estimating these
... Show More