Efficacy of Varnishes with: Bioactive Glass, Recaldent Technology and Silver Diamine Fluoride in Comparison with Sodium Fluoride on Tooth Surface Micro-hardness (an In Vitro Study)
Optical Mark Recognition (OMR) is the technology of electronically extracting intended data from marked fields, such as squareand bubbles fields, on printed forms. OMR technology is particularly useful for applications in which large numbers of hand-filled forms need to be processed quickly and with a great degree of accuracy. The technique is particularly popular with schools and universities for the reading in of multiple choice exam papers. This paper proposed OMRbased on Modify Multi-Connect Architecture (MMCA) associative memory, its work in two phases: training phase and recognition phase. The proposed method was also able to detect more than one or no selected choice. Among 800 test samples with 8 types of grid answer sheets and tota
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreThe business environment is witnessing great and rapid developments due to the economic and technological development that has caused damage to human beings, which requires the need to reduce this damage and work to protect the environment and participate in supporting the social aspects. This requires economic resources to be realized by the economic units. Economic development in preserving the environment that has caused damage and supporting the social aspects that preserve human rights, enhance their position and satisfy their needs in society. Global professional organizations, the United Nations and stakeholder representatives have been issuing the Global Reporting Initiative (GRI) to find guidelines for the preparation of
... Show MoreBackground: The aim of this national oral health survey was to determine the prevalence of malocclusions due to some anomalies in the dentition among the 13 years old Kurdish students in sulaimani intermediate school. Materials and methods: The total sample was 950 (455 males and 495 females) which assessed by diagnostic set and special instrument. The clinical examination was mainly based on the definitions of Björk et al. Some variables were recorded as present or absent sometimes denoting the tooth or the teeth involved in malocclusion and their distribution according to the whole sample. Results: The results showed that 1)The most common extracted tooth was the mandibular first molar (2.9%). 2) At this age group the most common partial
... Show MoreThis paper constructs a new linear operator associated with a seven parameters Mittag-Leffler function using the convolution technique. In addition, it investigates some significant second-order differential subordination properties with considerable sandwich results concerning that operator.
Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreThe Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.
A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin misassignment .The present results show an acceptable agreement with the combinatorial method of level density.
... Show MoreQuantum dots of CdSe, CdS and ZnS QDs were prepared by chemical reaction and used to fabricate organic quantum dot hybrid junction device. QD-LEDs were fabricated using ITO/TPD: PMMA/CdSe/Al, ITO/TPD: PMMA/CdS/Al and ITO/TPD: PMMA/ZnS/Al QDs devices which synthesized by phase segregation method. The hybrid white light emitting devices consists, of two-layers deposited successively on the ITO glass substrate; the first layer was of N, N’-bis (3-methylphenyl)-N, N’-bis (phenyl) benzidine (TPD) polymer mixed with polymethyl methacrylate (PMMA) polymers in ratio 1:1, while the second layer was 0.5wt% from each type of the (CdSe, CdS and ZnS) QDs for each device.The optical properties of QDs were characterized by UV-Vis. and photolum
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More