This study evaluated the extent to which obturation materials bypass fractured endodontic instruments positioned in the middle and apical thirds of severely curved simulated root canals using different obturation techniques. Sixty resin blocks with simulated root canals were used, each with a 50° curvature, a 6.5 mm radius of curvature, and a length of 16.5 mm, prepared to an ISO #15 diameter and taper. Canals were shaped using ProTaper Universal files (Dentsply Maillefer) attached to an X-smart Plus endo motor (Dentsply), set at 3.5 Ncm torque and 250 rpm, up to size S2 at working length. To simulate fractures, F2 and F3 files were weakened 3 mm from the tip, then twisted to break in the apical and middle sections of the canal, re
... Show MoreThe Internet has added another dimension to public relations in institutions and organisations, as it provided tools and communication channels, especially social networking sites, which provided information and data on public relations for the institution through these websites. In addition to its communication with its audience, and the audience's interaction with it, so our research tagged (the effectiveness of public relations of the Sunni Endowment Diwan through social networking sites): An analytical study of the official Facebook page of the Diwan that addresses the knowledge and monitoring of the contents of the official Facebook page that public relations adopt in providing information, data, and activities of the Sunni End
... Show MoreThe aim of the present study is to examine the effectiveness of a proposed unite in voluntary work in enhancing critical thinking skills and the attitudes towards responsible citizenship among eighth grade female students in the Sultanate of Oman. In order to collect the study data, the researchers employed a quasi-experimental research design with twenty female students from Al-Sideeqah bint Al-Sideeq for basic education school. The research data were collected via a critical thinking test that consisted of twenty-five items and a scale of twenty items under three different dimensions, which aimed to measure students' attitudes towards responsible citizenship. The researchers implemented these two instruments as pre- and post the experi
... Show MoreRacism is a serious issue that impacts a lot of people around the world. Since slavery days, racial discrimination has been increasing to abhorrent levels in relation to black people. The aim of individual psychology by Alfred Adler is to study human behaviour by situating it in the social context which makes his writing ideal to explanation of racism. This paper aims to study racism in Roy Williams’ Fallout from the perspective of Alfred Adler’s theory. Alfred Adler's individual psychology emphasizes the importance of social factors in shaping individual behavior, including the ways in which individuals form their sense of self and identity. This makes it a valuable framework for understanding the complex social and psychological facto
... Show MoreFusarium wilt causes economic losses on tomatoes every year. Thus, a variety of chemicals have been used to combat the disease. Pesticides have been effective in managing the disease, but they keep damaging the environment. Recently, eco-friendly approaches have been used to control plant diseases. This study aimed to achieve an environmentally safe solution using biological agents to induce systemic resistance in tomato plants to control Fusarium wilt disease caused by Fusarium oxysporum f.sp. lycopersici (FOL) in the greenhouse. The pathogen (FOL) has been molecularly confirmed and the biological agents have been isolated from the Iraqi environment. The effectiveness of the biological agents has been tested and confirmed. Results showed t
... Show MoreIn this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreAbstract
These experiments seek to investigate the effects of the fixed variations to the basic box plot on subjects' judgments of the box lengths. The study consists of two experiments, were constructed as an extension to the experiments carried out previously by Hussin, M.M. (1989, 2006). Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box length and also varying with respect to other elements such as, box width or whisker length. When he (1989) suggested in the future research points (1, 2), the changing length of the st
... Show More