This study evaluated the extent to which obturation materials bypass fractured endodontic instruments positioned in the middle and apical thirds of severely curved simulated root canals using different obturation techniques. Sixty resin blocks with simulated root canals were used, each with a 50° curvature, a 6.5 mm radius of curvature, and a length of 16.5 mm, prepared to an ISO #15 diameter and taper. Canals were shaped using ProTaper Universal files (Dentsply Maillefer) attached to an X-smart Plus endo motor (Dentsply), set at 3.5 Ncm torque and 250 rpm, up to size S2 at working length. To simulate fractures, F2 and F3 files were weakened 3 mm from the tip, then twisted to break in the apical and middle sections of the canal, respectively. All samples were sealed with GuttaFlow 2 and divided into three groups (n = 20/group) according to obturation technique: A) single cone, B) lateral condensation with a rotary spreader, and C) softcore obturators. Each group was then divided into two subgroups (n = 10) based on the instrument fracture location (1 = apical, 2 = middle). The linear intrusion of obturation materials through the fractured instruments was measured using ImageJ software and analyzed statistically with ANOVA, Tukey tests, and independent t-tests, with significance set at p<0.05. Material bypass in group B1 (3.27 ± 0.63 mm) was significantly greater than in group A1 (2.39 ± 0.44 mm) and group C1 (2.91 ± 0.77 mm). In group C2, bypass (5.76 ± 0.64 mm) was significantly higher than in group A2 (3.82 ± 0.2 mm) and group B2 (2.27 ± 0.96 mm). Additionally, bypass in group A2 was greater than in group B2, and group B1 had more bypass than B2, while group C2 exceeded C1. The lateral condensation technique with a rotary spreader and softcore obturators increased the bypass of obturation materials through fractured instruments in simulated curved canals. These techniques may thus enhance material flow in endodontic procedures involving instrument fractures.
In this research, the effect of changing the flood level of Al-Shuwaija marsh was studied using the geographic information systems, specifically the QGIS program, and the STRM digital elevation model with a spatial analysis accuracy of 28 meters, was used to study the marsh. The hydraulic factors that characterize the marsh and affecting on the flooding such as the ranks of the water channels feeding the marsh and the degree of slope and flat areas in it are studied. The area of immersion water, the mean depth, and the accumulated water volume are calculated for each immersion level, thereby, this study finds the safe immersion level for this marsh was determined.
This study is conducted to verify the efficienecy of local Ninivite rock when used in the treatment of drinking water in plants operating currently in the country in order to develop the situation of these stations to cope with the increase in population. Also, this will limit the pollutian which are increasing in the country's rivers.
(Euphrates and Tigris). These rivers are the sources to feed all water treatment plants in the country. The idea is the develop or the modify these stations by replacing part of top layer of sand filters used in these stations with Ninivite rock to operate as filters composed of two medium. The efficiency of this rock is compared with other materials used successfully worldwide in this area, such a
... Show MoreAbstract
The research aims to identify tax exemptions, their objectives and types, as well as to shed light on the concept of sustainable development, its objectives, dimensions and indicators (economic, social and environmental), as well as to analyze the relationship between tax exemptions and economic development, in addition to measuring and analyzing the impact of tax exemptions on economic development in Iraq for the period ( 2015 - 2021) using the NARDL model. The research problem centers on the fact that failure to employ financial policy tools correctly led to a weakness in achieving economic justice, which leads to a failure to improve social welfar
... Show MoreNA Nasir, H Amir, Faculty of medicine - Iraq, 2017 - Cited by 13
The study aimed to study the role of technology in the production of the mural photography, and to develop its concept to the viewer, through the achievement of the aesthetic and functional vision. Through this study, some types of these techniques, which are organically related to architecture, were identified.
The mural photography includes a huge amount of techniques, and methods, and the researcher presented them through five techniques: (AlTamira, Alfresk, acrylic, mosaic, and glass art, which takes the architectural character.
The research consists of:
Methodological framework: research problem, research objectives, research limits, importance of research, and definition of terms.
Theoretical framewo
... Show MoreAR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show More