One hundred samples of root canal bacteria were isolated from patients teeth with primary and secondary infected root canal from all the ages . Biochemical and microscopial tests were done for identification of these isolates. Twenty four isolates were confirmed as E. faecalis species by using these tests. Genetic diagnosis for the all isolates was also done by using polymerase chain reaction ( PCR ). Thirty two isolates were confirmed to belong to E. faecalis species by using this test.
Background: Cleaning and shaping of root canals successfully requires high volumes of irrigation solutions that can only be applied to the apical third of root canal after enlargement with instrument, so the aim of this study was to evaluate and to compare the efficiency of Maxi-I-probe (side-vented needle), in the amount of root canal irrigant penetration for five different master apical file sizes (MAF) and four different degrees of coronal and middle thirds flaring. Materials and Methods: Two hundred resin blocks with simulated root canals were used in this study and divided into 5 major groups (40 for each) based on the size of master apical files (#20, #25, #30, #35, and #40). Each major group was subdivided into 4 subgroups depending
... Show MoreBackground: The incisive canal is an anatomical structure with an important location in the anterior maxilla, analyzing this canal and its relation to the bone anterior to the canal is necessary during dental implant. Aim of this study is evaluated effect of gender, age and tooth loss in area of maxillary central incisors teeth on the dimensions of incisive canal and buccal bone anterior to the canal using spiral computed tomography. Materials and Methods: Sample consists of prospective study for 156 subjects for both gender, they divided into two groups, 120 dentate group (60 male and 60 female) with age ranging from (20-70) and 36 edentate group (with missing maxillary central incisors) (18 male and 18 female) with age ranging from (50-70
... Show MoreBackground: Healing of a tooth extraction socket is a complex process involving tissue repair and regeneration. It involves chemotaxis of appropriate cells into the wound, Transformation of undifferentiated mesenchymal cells to osteoprogenitor cells, proliferation and differentiation of committed bone forming cells, extracellular matrix synthesis, mineralization of osteoid, maturation and remodeling of bone. These cellular events are precisely controlled and regulated by specific signaling molecules. Some of these like transforming growth factor beta (TGF-?), vascular endothelial growth factor (VEGF), bone morphogenetic proteins (BMP) and insulin like growth factors (IGF) are well conserved proteins involved in the initial response to injur
... Show MoreDrilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.
Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.
This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.
The experim
... Show MoreIn this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains
This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
Attack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting from the balance between O's and I' in the key to reduce the probability of key space.
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More