Efficacy of Varnishes with: Bioactive Glass, Recaldent Technology and Silver Diamine Fluoride in Comparison with Sodium Fluoride on Tooth Surface Micro-hardness (an In Vitro Study)
Esterification considers the most important reaction in biodiesel production. In this study, oleic acid was used as a suggested feedstock in order to study and simulate production of biodiesel. The batch esterification reaction of oleic acid was carried out at various operating conditions; temperature from 40 to 70 °C, ethanol to oleic acid molar ratio from 3/1 and 6/1 and a reaction time up to 180 min.
The catalyst used was prepared NaY zeolite, which is added to the reaction mixture as 2, 5 and 10 wt.% of oleic acid.
The results show that the optimum conditions, gives 0.81 conversion of oleic acid, were 6/1 molar ratio of ethanol/oleic acid, 5 wt.% NaY relative to initial oleic acid, 70°C and 60 minutes. The activation energy o
Friction stir spot welding (FSSW) is a relatively new welding process that may have significant advantages compared to the fusion processes as follows joining of conventionally non-fusion weldable alloys, reduced distortion and improved mechanical properties of weldable alloys joints due to the pure solidstate joining of metals. In this paper, a three-dimensional model based on finite element analysis is used to study the thermal history in the spot-welding of aluminum alloy 2024. The model take place the thermomechanical property on the process of the welded metals. The thermal history and the evolution results with numerical model at the measured point in the friction stirred spot weld have a good matching, then the prediction of the t
... Show MoreA Mobile Ad hoc Network (MANET) is a collection of mobile nodes, that forms on the fly a temporary wireless multi-hop network in a self-organizing way, without relying on any established infrastructure. In MANET, a pair of nodes exchange messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. For this purpose, an efficient routing protocol is required. This paper introduced performance study of three of MANET protocols (AODV, GRP and OSPFv3). This study was one of the newer studies because wireless communication played an important role in today’s application and the field of mobile ad hoc network becomes very popular for the researchers in the last years. This study w
... Show MoreNew isatinic hydrazone Schiff-base ligands, namely furan-2-carboxylic acid (2-oxo-1,2-dihydro-indol- 3-ylidene)-hydrazide (L1), thiophene-2-carboxylic acid (2- oxo-1,2-dihydro-indol-3-ylidene)-hydrazide (L2) and 2-(pyridine-2-yl-hydrazono)-1,2-dihydro-indol-3-one) (L3) are reported. The ligands were prepared by the condensation of furan-2-carboxylic acid hydrazide (L1), thiophene- 2-carboxylic acid hydrazide (L2), and 2-hydrazino pyridine (L3) with isatine. Monomeric complexes were prepared from the reaction of the corresponding metal chloride with the ligands. The ligands and their nine new complexes of the general formulae [M(Ln)2]Cl2 [where M = Co(II), Zn(II) and Cd(II); n = L1, L2 and L3] were characterised by spectroscopic methods (FTI
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More