Peak Ground Acceleration Models Predictions Utilizing Two Metaheuristic Optimization Techniques
...Show More Authors
Summary First: The importance of the study and the need for it: The society is composed of an integrated unit of groups and institutions that seek to achieve a specific goal within a system of salary, and the family remains the most influential institutions on the individual and the unity of society, with the roles and responsibilities of the individual and society, and through the continuation and strength of other social organizations derive their ability On the other hand, any break-up in the institution of the family is reflected negatively on the cohesion of society and its interdependence, and the causes of this disintegration vary from society to another, but family problems remain the main factor in obtaining it. Second: Study Ob
... Show MoreThe aim: to evaluate combined microscopy techniques for determining the morphological and optical properties of methadone hydrochloride (MDN) crystals. Materials and methods: MDN crystal formation was optimized using a closed container method and crystals were characterized using polarized light microscope (PLM), scanning electron microscopy (SEM) and confocal microscopy (CM). SEM and CM were used to determine MDN crystal thickness and study its relationship with crystal retardation colours using the Michel-Levy Birefringence approach. Results: Dimensions (mean±SD) of diamond shaped MDN crystals were confirmed using SEM and CM. Crystals were 46.4±15.2 Vs 32.0±8.3 µm long, 28.03±8.2 Vs 20.85±5.5 µm wide, and 6.62±
... Show MoreCurrent numerical research was devoted to investigating the effect of castellated steel beams without and with strengthening. The composite concrete asymmetrical double hot rolled steel channels bolted back to back to obtain a built-up I-shape form are used in this study. The top half part of the steel is smaller than the bottom half part, and the two parts were connected by bolting and welding. The ABAQUS/2019 program employed the same length and conditions of loading for four models: The first model is the reference without castellated and strengthening; the second model was castellated without strengthened; the third model was castellated and strengthened with reactive powder concrete encased in the
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreSoil fertility is a crucial factor in measuring soil quality, it indicates the extent to which soil can support plant life. Soil fertility is measured by the amount of macro and micronutrients, pH, etc. Soil nutrients are depleted after each harvest and therefore must be added. To maintain soil nutrient levels, fertilizer is added to the soil. Adding fertilizer in the precise amount is a matter of great importance because excess or insufficient application can harm plant life and reduce productivity. The use of modern technology is a solution to this problem. Although automated techniques for sowing, weeding, crop harvesting, etc. have been proposed and implemented, none of the techniques are aimed to maintaining soil fertility. The study a
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreEnglish
Abstract Background: This in-vitro study was to evaluated bitewing radiograph and tactile examination for detection secondary caries adjacent to amalgam restorations. Material and method: Sixty primary extracted molars with class I and class II amalgam restorations were selected from children, and examined by bitewing radiographs were taken by using film holders and interpreted on a backlit screen without magnification. Then, we used tactile examination with blunt probe. Result: The result of this study showed that the best cut-off points for the sample were found by a Receiver Operator Characteristic (ROC) analysis, and the area under the ROC curve and the sensitivity, specificity and accuracy of the techniques were calculated for enamel (
... Show More