A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.
Background: The aim of this study was to evaluate and compare the apical microleakage around retrograde cavities prepared with ultrasonic technique and filled with (Biodentineâ„¢) Materials and methods: 40 extracted single rooted human permanent maxillary teeth with mature apices were selected. The roots were prepared chemo-mechanically using k-files with crown-down technique and then obturated with lateral condensation gutta-percha technique. Teeth were divided into four main groups according to the cavity preparation method either manual or ultrasonic technique: Group A (n=10): A class I retrograde cavity at root end was prepared with traditional handpeice equipped and placement of Biodentine with manual condensation. Group B (n=10):
... Show MoreA procedure, depending on the derivatization and determination of aniline was depicted andvalidated in this study. 8-hydroxyquinoline (8-HQ) was used as the derivatizing agent for thedetermination of aniline. An optimization study was performed for the derivatization reaction, i.e.,the diazonium coupling reaction, the optimum parameters were as follows: 22 mM of hydrochloricacid, 54mM of sodium hydroxide, and 1.8mM of sodium nitrate. The optimization study of themethod of cloud point extraction (CPE) revealed that the extraction solvent was 0.5 ml of Triton X-100, the optimum temperature was 90 °C, and the incubation time was 25 min. The linearity,correlation coefficients, molar absorptivities, and limits of detection were improved using t
... Show MoreIn the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show MoreThe theory of the psychologist’s Piaget states that man passes through four stages; other says that mankind passes through five. At each stage, human learn new characteristics, values, skills, and cultures from different environment that differ from one society to another. Therefore, the cultures of societies vary according to the diversity of the environments. These environments also vary depending on the circumstances surrounding them, e.g., in war environment, the individual learns what he does not learn from living in safe environment. As the environment changes, the communicative message also changes. This message is subject to person, groups, organizations and parties and directed to a diverse audience in its orientations and bel
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThis study is intended to examine the concept of transcultural identity in the travel book The Global Soul: Jet Lag, Shopping Malls, and the Search for Home by (Iyer, 2001). Jeffries’ model of critical stylistics (2010) (henceforth, CS) has been selected to analyze the book. To be more specific, Negation is selected to analyze the concept under study. As such, the study aims at finding out how Negation is used to portray ideological meanings representing the concept of transcultural identity in one non-fictional travel book; and finding out the ideologies related to the concept analyzed. The analysis of the data shows that Negation is a suitable analytical tool to reach the ideational meaning of the text towards the concept of tra
... Show MorePresent study was conducted in order to assess Slabiaat water quality by measuring some physical and chemical factors of river water, the study included a choice of three stations along of Slabiaat River in Samawa city, water samples collected a monthly during the period from September 2013 August 2014. The study involved measuring the Air & water temperatures, pH, Electrical conductivity, Total dissolved solids, Dissolved oxygen, Total hardness, calcium hardness, magnesium, turbidity, and some types of bacteria in River water. The study results showed that the values of air & water temperatures have ranged between (20.1-36.6)?C , (10-21.8) in Slabiaat River, respectively . pH values ranged between (6.6-8.7). Electrical conductivity in
... Show MoreThe purpose of this study is to illuminate the role of CBCT in forensic dentistry through variations of mandibular measurements of Bonwill’s triangles in gender determination among the Iraqi population.
In this retrospective study 70 CBCT scans were analyzed to measure the Bonwill’s triangle, 35 for males and 35 for females aged between 20 and 50 years, all data were collected at the oral and maxillofacial radiology department in Ghazi AL-Hariri hospital for 3 months, and the data were obtained using a Kavo CBCT device (3D On De
Vagrancy is global problem, but its geographical distribution differs from one society
to another and from one place to another inside the same society.Till now there isn't a real factor that can explain the phenomenon, spite that economy plays aconstituent and distinguishing part, and spite the fact that Vagrancy is considered a realdeviation that can be compared with criminality level, and cannot be separated from its effecton family, local society and school. In addition to unprecedented work under heavily pressurethat attack to a minimum protection and safety. Vagrant may be a child, a teen, a young, or
even an old man. Vagrancy thus means different people with different ages and not onlyprecisely children. Vagrant is not neces
Background: Diabetes mellitus (DM) could be regarded as a set of chronic metabolic disorders which have a common aspect of hyperglycemia. The resistance in the peripheral actions of insulin or impaired insulin secretion could be the reason hepcidin which is a peptide hormone derived from liver, in systemic iron homeostasis is an essential regulator, and its lopsided production participates in the pathogenesis of iron disorders in spectrum. Osteoporosis often accompanies many diseases like ß-thalassemia, hemochromatosis, sickle liver diseases, cell disease and hemosiderosis featured by iron overload, evidences suggest that Iron overload and iron deficiency are suggested by evidences that they affect bone in a negative way, acting
... Show More