This study evaluated the extent to which obturation materials bypass fractured endodontic instruments positioned in the middle and apical thirds of severely curved simulated root canals using different obturation techniques. Sixty resin blocks with simulated root canals were used, each with a 50° curvature, a 6.5 mm radius of curvature, and a length of 16.5 mm, prepared to an ISO #15 diameter and taper. Canals were shaped using ProTaper Universal files (Dentsply Maillefer) attached to an X-smart Plus endo motor (Dentsply), set at 3.5 Ncm torque and 250 rpm, up to size S2 at working length. To simulate fractures, F2 and F3 files were weakened 3 mm from the tip, then twisted to break in the apical and middle sections of the canal, respectively. All samples were sealed with GuttaFlow 2 and divided into three groups (n = 20/group) according to obturation technique: A) single cone, B) lateral condensation with a rotary spreader, and C) softcore obturators. Each group was then divided into two subgroups (n = 10) based on the instrument fracture location (1 = apical, 2 = middle). The linear intrusion of obturation materials through the fractured instruments was measured using ImageJ software and analyzed statistically with ANOVA, Tukey tests, and independent t-tests, with significance set at p<0.05. Material bypass in group B1 (3.27 ± 0.63 mm) was significantly greater than in group A1 (2.39 ± 0.44 mm) and group C1 (2.91 ± 0.77 mm). In group C2, bypass (5.76 ± 0.64 mm) was significantly higher than in group A2 (3.82 ± 0.2 mm) and group B2 (2.27 ± 0.96 mm). Additionally, bypass in group A2 was greater than in group B2, and group B1 had more bypass than B2, while group C2 exceeded C1. The lateral condensation technique with a rotary spreader and softcore obturators increased the bypass of obturation materials through fractured instruments in simulated curved canals. These techniques may thus enhance material flow in endodontic procedures involving instrument fractures.
Abstract
This study was to demonstrate the role-use planning scientific methods is disabled and little used in the planning and follow-up construction of vital projects in the province of Baghdad, including network planning methods, in order to find the optimal time to finish the project in light of the resources available and the budget set for it, in the current research has been used the most prominent network planning methods and two stylistic (CPM / PERT), was the application of the critical path method on standard-design school project (traditional) to draw Action Network according to confirmed times for the activities of the project and account his Crashing time , It was Pert technique applied to the project hemato
... Show MoreThe relative strength index (RSI) is one of the best known technical analysis indicators; it provides the speculators by prior signals about the future stock’s prices, and because the speculations in shares of companies which listed in the Iraq Stock Exchange have a high degree of risk, like risk of shares prices felling, so the speculators became committed to use some methods to reduce these risks, and one of these methods is the technical analysis by using the relative strength index (RSI) which enable the speculators of choosing the right time for buy and sell the stocks and the right time to enter or leave the market by using the historical rice data. And from here the problem of the research formulated as “Is the using of
... Show MoreAbstract
Purpose of this study is to investigate the relationship between Advertising Appeals, Attitudes toward Advertising, and Consumer Buying Behavior for Smart Phone The study was carried out on the students of Middle East University (MEU) In Amman- Jordan. A measurement scales with acceptable reliability and validity is developed to capture the dimensions of study variables. Four hypotheses were tested using Statistical package (SPSS-17). A two-step detailed statistical analysis of data was involved. First, descriptive statistics was performed to understand the underlying components of study variables; second, regression analysis and Path analysis using AMOS 7 were performed t
... Show Moreproduction of the spot in the news channels - a study of patterns of spot media used in the production of spring breaks Arab Al-Arabiya
The spacers news in Arabic, one of the messages that seek channel output are fit and policy on the one hand and meet the needs of viewers for information intensive and image influential to find out the latest developments on the Arab arena, especially the Syrian revolution on the other and thus The viewer for the type of coverage the stomach through a newsletter about the event on the one hand to keep following up on her and eager to watch the other hand
And sou
... Show MoreAccording to the circumstances experienced by our country which led to Occurrence of many crises that are the most important crisis is gaining fuel therefore , the theory of queue ( waiting line ) had been used to solve this crisis and as the relevance of this issue indirect and essential role in daily life .
This research aims to conduct a study of the distribution of gasoline station in (both sides AL – kharkh and AL Rusafa, for the purpose of reducing wasting time and services time through the criteria of the theory of queues and work to improve the efficiency of these stations by the other hand. we are working to reduce the cost of station and increase profits by reducing the active serv
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe goal of this investigation is to prepare zinc oxide (ZnO) nano-thin films by pulsed laser deposition (PLD) technique through Q-switching double frequency Nd:YAG laser (532 nm) wavelength, pulse frequency 6 Hz, and 300 mJ energy under vacuum conditions (10-3 torr) at room temperature. (ZnO) nano-thin films were deposited on glass substrates with different thickness of 300, 600 and 900 nm. ZnO films, were then annealed in air at a temperature of 500 °C for one hour. The results were compared with the researchers' previous theoretical study. The XRD analysis of ZnO nano-thin films indicated a hexagonal multi-crystalline wurtzite structure with preferential growth lines (100), (002), (101) for ZnO nano-thin films with different thi
... Show More