Objective: The antimicrobial efficacy of three disinfection solutions: 5.25% sodium hypochlorite (NaOCl), 2% chlorhexidine (CHX) and Listerine mouthwash were investigated as routine chair-side gutta-percha (GP) disinfection reagents. Design: four groups of gutta percha points were contaminated with E. faecalis bacteria then disinfected by immersion in different solutions (5.25% sodium hypochlorite, 2% chlorhexidine gluconate, Listerine mouth wash and distilled water as control) after 1 and 7 days culturing periods. The antibacterial efficacy of these disinfection solutions was evaluated by using colonies per units (CPU) Methods: Forty GP cones (F3 Dentsply) were sterilized with ethylene oxide gas before immersed contamination within broth media containing E. faecalis for 20 min. Cones then divided them equally into four groups (n = 10) based on the treated disinfection solution, whilst one group received no disinfection treatment (control group). Each cone was then immersed into broth media within separated Eppendorf tubes for 3 min before 100 μl was taken to be cultured in an agar plate for 24h. The remaining broth media tubes were incubated for 7 days at 37℃ before taking another 100 μl to be cultured in new agar plates. CPU for E. faecalis growth were calculated for the two period cultured plates: immediately after GP disinfection (day 0) and after 7 days incubation. Results: All groups except control showed low E. faecalis colonies growth. The colony-forming units (CFU) of E. faecalis on day 0 was zero growth in NaOCl and CHX disinfected groups and much higher (14) within Listerine group. On day 7, only NaOCl group still have complete inhibition for E. faecalis colonies growth. CHX antimicrobial potency was decreased with time, while CFU for Listerine group decreased after 7 days incubation. Conclusion: The NaOCl was the best disinfection for gutta-percha cones, followed by CHX and Listerine mouthwash
In this paper, the delay integral equations in population growth will be described,discussed , studied and transfered this model to integro-differential equation. At last,we will solve this problem by using variational approach.
In this study, manganese dioxide (MnO₂) nanoparticles (NPs) were synthesized via the hydrothermal method and utilized for the adsorption of Janus green dye (JG) from aqueous solutions. The effects of MnO₂ NPs on kinetics and diffusion were also analyzed. The synthesized NPs were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), energy-dispersive X-ray analysis (EDX), and Fourier-transform infrared spectroscopy (FT-IR), with XRD confirming the nanoparticle size of 6.23 nm. The adsorption kinetics were investigated using three models: pseudo-first-order (PFO), pseudo-second-order (PSO), and the intraparticle diffusion model. The PSO model provided the best fit (R² = 0.999), indicating that the adsorpti
... Show MoreDifferent Arabic and Islamic societies are free of evil instincts. Therefore, certain provisions of legitimacy came to stress the importance of the intentions of sharia to achieve the interests of all people that involve several aspects, including the five fundamental things: religion, oneself, offspring, mind and money. Almighty Allah has specified certain punishments on those who violate these things by imposing punishments on the part of the criminal to preserve souls. He imposes the penalty of theft to preserve property, the Hadd punishment for adultery to preserve the symptoms, the punishment on the drunk to preserve the mind, and the Hadd punishment for the apostate to preserve the religion. By the adherence to these punishments li
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreDelays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement
The author obtain results on the asymptotic behavior of the nonoscillatory solutions of first order nonlinear neutral differential equations. Keywords. Neutral differential equations, Oscillatory and Nonoscillatory solutions.
It is well known that the spread of cancer or tumor growth increases in polluted environments. In this paper, the dynamic behavior of the cancer model in the polluted environment is studied taking into consideration the delay in clearance of the environment from their contamination. The set of differential equations that simulates this epidemic model is formulated. The existence, uniqueness, and the bound of the solution are discussed. The local and global stability conditions of disease-free and endemic equilibrium points are investigated. The occurrence of the Hopf bifurcation around the endemic equilibrium point is proved. The stability and direction of the periodic dynamics are studied. Finally, the paper is ended with a numerical simul
... Show MoreThis study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions