Today, the five Caspian riparian states on the shores of the Caspian Sea (Kazakhstan, Turkmenistan, Azerbaijan, Russia, and Iran) have become a front for ambitions and international and regional competition, especially in light of the features and characteristics that natural geography has endowed them with and their enjoyment of a group of economic and mineral wealth that are not optimally exploited so far which made it a strategic attraction area for international trends and interventions, especially Western ones. It is a battleground for major international companies aiming to monopolize promising industrial investments in order to impose control and influence on the region’s resources and economic wealth and thus impose their forei
... Show MoreBackground: Polyetheretherketone (PEEK) is a promising implant material due to its superior biomechanical strength. However, due to its hydrophobic nature and lack of cellular adhesion properties, it has poor integration with bone tissue. Methods: A fractional CO2 laser was used with various parameters for surface texturing of PEEK substrate to enhance its surface properties. An optical microscope and field-emission scanning electron microscope (FESEM) were used to examine the surface morphology of untextured and laser-textured samples. Energy dispersive X-ray spectroscopy (EDX) was performed to determine the effect of the laser on the microstructure of PEEK. Surface microroughness, atomic force microscopy (AFM), and wettability were invest
... Show MoreRecently, a great rise in the population and fast manufacturing processes were noticed. These processes release significant magnitudes of waste. These wastes occupied a notable ground region, generating big issues for the earth and the environment. To enhance the geotechnical properties of fine-grained soil, a sequence of research projects in the lab were conducted to analyze the impacts of adding sludge waste (SW). The tests were done on both natural and mixed soil with SW at various proportions (2%, 4%, 6%, 8%, and 10%) based on the dry mass of the soil used. The experiments conducted focused on consistency, compaction, and shear strength. With the addition of 10% of SW, the values of LL and PI decreased by 29.7% and 3
... Show MoreAssume that G ≅ HN the Harada–Norton group. In this paper, effective investment for the graph ΓRI HN standard features to acquire meaningful algebraic results for the graph ΓRI HN and its corresponding group HN. For instance, marketing a modern methods to understand the way of create a precise small subgroups in G. Furthermore, performing a full investigation for getting particular ΓRI HN parameters.
An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More