Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable
Background: Apicoectomy and retrograde filling is indicated when conventional endodontic treatment is impossible or failed to achieve apical seal. The aim of this study was to evaluate the effect of ER: YAG laser on apical microleakage. Materials and Methods: Sixty extracted single-rooted teeth were used in this study. The roots were divided into six groups. Group 1: apicoectomy by fissure bur, and apical cavities prepared by round bur, then cavities were filled with MTA. Group 2: the roots preparations and fillings were the same as group 1, then the apical areas were treated by Er:YAG Laser. Group 3: apicoectomy by fissure bur, and apical cavities prepared by ultrasound retrotip and cavities were filled with MTA. Group 4: the roots prepara
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreIn this study, the effect of Nd: YAG laser on the activity of superoxide dismutase (SOD) and alcoholdehydrogenase (ADH) was investigated. The Saccharomyces cells were irradiated using 532nm Q-Switched Nd: YAG laser with (1Hz) frequency. Different fluences 11.3, 22.6 and 33.9mJ/cm2 and different number of pulses 15, 30 and 60 pulse were used. The irradiated cells were incubated in a liquid nutritive medium for 24 hours. After incubation, the cells were harvested and disrupted to extract the intracellular enzymes and their activities were assessed. In comparison with the control, the irradiated cells showed a significant increase in the activity and the specific activity of SOD at energy densities of 11.3 and 22.6mJ/cm2 at 30 and 60 pulses
... Show MoreSCADA is the technology that allows the operator to gather data from one or more various facilities and to send control instructions to those facilities. This paper represents an adaptable and low cost SCADA system for a particular sugar manufacturing process, by using Programmable Logic Controls (Siemens s7-1200, 1214Dc/ Dc/ Rly). The system will control and monitor the laboratory production line chose from sugar industry. The project comprises of two sections the first one is the hardware section that has been designed, and built using components suitable for making it for laboratory purposes, and the second section was the software as the PLC programming, designing the HMI, creating alarms and trending system. The system will ha
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More