In this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.
Background: The aim of this study was to determine phototoxic effect of visible blue light on anaerobic periodontal pathogens namely Aggregatibacter actinomycetemcomitans and Porphyromonas gingivalis. Materials and methods: Strains of Aggregatibacter actinomycetemcomitans and Porphyromonas gingivalis were isolated from pockets of systemically healthy patients aged between 35-55 years old with pocket depths of 5-6 mm, the bacteria cultured on special blood Agar plates solid media, then subjected to visible blue light emitted from commercially available light cure devise (LED curing light); that emits blue light (400-500nm) of 1000mw energy at different periods of time exposures, then the CFU of each plate was measured by direct colony count
... Show MoreThe purpose of this research is to find the estimator of the average proportion of defectives based on attribute samples. That have been curtailed either with rejection of a lot finding the kth defective or with acceptance on finding the kth non defective.
The MLE (Maximum likelihood estimator) is derived. And also the ASN in Single Curtailed Sampling has been derived and we obtain a simplified Formula All the Notations needed are explained.
Background: This study aimed to determine the value of Beta angle for a sample of Iraqi adults with class I skeletal and dental relations and to verify the existence of sexual dimorphism and to find out the relation between this angle and other craniofacial measurements. Materials and Methods: Sixty dental students (23 males and 37 females) with an age ranged between 20-31 years old and having class I skeletal and dental relations were chosen for this study. Each student was subjected to clinical examination and digital true lateral cephalometric radiograph. The radiographs were analyzed using AutoCAD 2007 computer program to measure the angular and linear variables. Descriptive statistics were obtained for the measurements for both genders
... Show MoreBackground: The present in-vitro study was undertaken to evaluate and compare fracture resistance of weakened endodontically treated premolars with class II MOD cavities restored with different bulk fill composite restorations (EverX posterior, Alert, Tetric EvoCeram Bulk Fill, and SDR). The type and mode of fracture were also assessed for all the experimental groups. Materials and Method: Forty-eight human adult maxillary premolar teeth were selected for this study. Standardized extensive class II MOD cavities with endodontic treatment were prepared for all teeth, except those that were saved as intact control. The teeth were divided into six groups of eight teeth each (n=8): (Group 1) intact control group, (Group 2) unrestored teeth with
... Show MoreSince June 2020, an explosion in number of new COVID-19 patients has been reported in Iraq with a steady increment in new daily reported cases over the next 3 months. The limited number of PCR kits in the country and the increment in the number of new COVID-19 cases makes the role of CT scan examinations rising and becoming essential in aiding the health institutions in diagnosing and isolating infected patients and those in close contacts. This study will review the spectrum of CT pulmonary changes due to COVID-19 infection and estimate the CT severity score index and its relation to age, sex, and PCR test results
God Almighty put in his great book secrets that do not end, and wonders that do not expire, for he is the one from which the scholars are not satisfied, and he does not create due to the multitude of response, and it is the comprehensive and inhibitory book that God conceals to the worlds, and he challenged the two heavyweights to come up with something like it.
At all times, issues arise in the Noble Qur’an that fit the needs of the people of that time and their culture, for it is an eternal book, characterized by the ability to give, extend and respond to addressing the problems of the age and its variables, when the Arabs had little luck at the time of the message’s descent from the scientific culture, and their proficienc
... Show MoreCompression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreIn this paper a prey - predator model with harvesting on predator species with infectious disease in prey population only has been proposed and analyzed. Further, in this model, Holling type-IV functional response for the predation of susceptible prey and Lotka-Volterra functional response for the predation of infected prey as well as linear incidence rate for describing the transition of disease are used. Our aim is to study the effect of harvesting and disease on the dynamics of this model.
Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the
... Show More