Preferred Language
Articles
/
uBd7MI8BVTCNdQwCl19h
Cleaning efficacy and instrumentation time using rotary file system in primary molars (comparative study)
...Show More Authors

ABSTRACT— In primary teeth, root canal treatment is a time consuming and challenging procedure, particularly during the most important step in endodontic treatment which is the preparation of the canal. Pulpectomy is the treatment of choice in all the necrotic primary teeth. For better treatment protocol, advancing technology brought the rotary system to reduce the manual dexterity and improve the quality of treatment for pulpectomy. This study aimed to compare and assess the efficacy of cleaning and the time required for the instrumentation during the preparation of root canals of the primary molars using the rotary and the manual (conventional) systems. Thirty root canals of primary teeth were selected. These teeth submitted to access opening and then all the canals injected with Indian ink. Then, 48 hours later, the teeth were randomly classified into two groups: group A (n=fifteen tooth): where the manual preparation of the root canals was done by stainless steel K- files, while group B (n= fifteen tooth): consisted of the root canals that prepared with rotary two shape system. The total instrumentation time was measured using a digital stopwatch. After that, a disk bur was used to section the roots. Then, a digital camera was used to photograph the specimens to evaluate the root canal cleaning. The cleaning efficacy was compared at the coronal, middle and apical level. In the coronal third, rotary two shape system showed more removal to the ink than the K-file with statistical significant difference (p <0.05), however, for the middle third of the canal, no statistical difference was found between the two systems (p=0.05). While at the apical level, K-file showed more removal to the ink than the rotary two shape system and with statistical significant difference (p <0.05). Evaluation of the total samples revealed no statistical significant difference concerning the efficacy of cleaning between K-files and rotary two shape system files. The group that was rotary prepared took less time for the canal preparation as compared to the manual group (80.063 sec., 144.576 sec. respectively). No significant difference was found between the two systems concerning the cleaning efficacy. Instrumentation done by the rotary system took significantly less time than that of the manual. KEYWORDS: Cleaning efficacy, manual instrumentation, primary teeth, rotary instrumentation.

Publication Date
Sun Jun 26 2022
Journal Name
Electrical Engineering
Optimal insulation design of form-wound stator winding with stress grading system under fast rise-time excitation
...Show More Authors

The effective insulation design of the stress grading (SG) system in form-wound stator coils is essential for preventing partial discharges and excessive heat generation under pulse-width modulation excitation. This paper proposes a method to find the optimal insulation design of the SG system aimed at reducing the dielectric and thermal stresses in the machine coil. The non-uniform transmission line model is used to predict the voltage propagation along the overhang, SG, and slot regions considering the variation in the physical properties of the insulation layers. The machine coil parameters for different insulation materials are calculated by using the finite element method. Two optimization algorithms, fmincon and particle swarm optimiz

... Show More
Crossref
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 05 2022
Journal Name
Iraqi Journal Of Science
Investigation of Microbial Contamination of Primary Schools in Baghdad City
...Show More Authors

A microbial contamination of several primary schools (official and private) in
Baghdad city was conducted. Sampling was performed in each school from desk,
door handle, and hand of students.
Out of 113swabs (classes desk, door holder, and students hands ) obtained from
ten primary schools, growth wasobserved in 91 samples (80.5%) (for official
school 84.6% and 71.4 for private school.
The results of recent study revealed that the official schools showed higher
contamination levels(130 CFU ) than private ones (90 CFU).
Resultes revealed that a total of 12 morphologically different bacterial species
were isolated from 62 bacterial isolates,among which gram negative bacteria 40
isolates(64.5%) were higher than

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Nondestructive Evaluation of Coatings Delamination Using Microwave Time Domain Reflectometry Technique
...Show More Authors

View Publication
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Mon Sep 20 2021
Journal Name
Journal Of Craniofacial Surgery
Presurgical Assessment of Anatomical Landmark Position Using Two Views of Cone Beam Computed Tomography: A Comparative Radiological Study
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 14 2016
Journal Name
Transactions Of The Asabe
Using Terahertz Time-Domain Spectroscopy to Discriminate among Water Contamination Levels in Diesel Engine Oil
...Show More Authors

View Publication
Scopus (31)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Enhancing the Accuracy of Health Care Internet of Medical Things in Real Time using CNNets
...Show More Authors

     This paper presents an efficient system using a deep learning algorithm that recognizes daily activities and investigates the worst falling cases to save elders during daily life. This system is a physical activity recognition system based on the Internet of Medical Things (IoMT) and uses convolutional neural networks (CNNets) that learn features and classifiers automatically. The test data include the elderly who live alone. The performance of CNNets is compared against that of state-of-the-art methods, such as activity windowing, fixed sample windowing, time-weighted windowing, mutual information windowing, dynamic windowing, fixed time windowing, sequence prediction algorithm, and conditional random fields. Th

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Research In Medical And Dental Science
Evaluation of the Serum Level of Interleukin-6 in Patients Undergoing Surgical Removal of Impacted Mandibular Third Molars
...Show More Authors

Evaluation of the Serum Level of Interleukin-6 in Patients Undergoing Surgical Removal of Impacted Mandibular Third Molars, Hussain A Taher*, Salwan Y Bede

View Publication Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Transient Stability Enhancement and Critical Clearing Time Improvement for Kurdistan Region Network using Fact Configuration
...Show More Authors

The Electrical power system has become vast and more complex, so it is subjected to sudden changes in load levels. Stability is an important concept which determines the stable operation of the power system. Transient stability analysis has become one of the significant studies in the power system to ensure the system stability to withstand a considerable disturbance. The effect of temporary occurrence can lead to malfunction of electronic control equipment. The application of flexible AC transmission systems (FACTS) devices in the transmission system have introduced several changes in the power system. These changes have a significant impact on the power system protection, due to differences inline impedance, line curre

... Show More
View Publication Preview PDF
Crossref