Background: The present study was conducted to evaluate the effects of different bleaching methods on the shear bond strength of orthodontic Sapphire brackets bonded to human premolars teeth using light cured composite resin and to determine the predominant site of bond failure. Materials and Methods: Thirty freshly extracted human premolars were selected and randomly divided into three groups (10 per group). These groups are: control (unbleached) group, hydrogen peroxide group (HP) 37.5% ; which is the in- office bleaching method group, carbamide peroxide group (CP) 16%; which is the at- home bleaching method group. After bleaching process was performed, all the teeth stored in distilled water in a sealed container at room temperature for
... Show MoreThe increasing use of polymeric materials in the daily life, leads to challenges in the processing industry to deliver high performance materials with affordable terms. However, new processing techniques lead to high costs. In order to reduce processing costs it is necessary to understand the non-Newtonian behavior of the polymers in their molten state to be able to simulate the processes before the construction of the plants starts. Here the shear thinning behavior of the viscosity of polymeric melts is essential. Thus, this paper deals with the experimental investigation of the thermo-rheological behavior of the viscosity of one of the most used polymers (Polypropylene) over a wide range of temperatures and shear rates. Furthermo
... Show MoreBackground and objectives: This study aimed at testing the effect of plastic sleeve or barrier, used to cover the guide of the light cure unit to prevent cross-infection, on the shear bond strength and site of bond failure of stainless steel and ceramic orthodontic brackets. Materials and methods: Forty orthodontic brackets; twenty stainless steel and twenty ceramic brackets bonded to forty extracted human maxillary first premolars using light cure adhesive cured with and without the use of a protective plastic barrier on the guide. Comparing the effect of this barrier on the shear bond strength and adhesive remnant index was performed using an independent t-test and Chi-square test. Results: The protective barrier had decreased the shear b
... Show MoreArterial aneurism and stenosis are disorders that lead to circulation malfunction. Stenosis often leads to hypoxia of the organ depending on the affected artery, whilst aneurism can lead to dissection with known lethal consequences. On both cases, the pulse wave produced by the contracting heart is reflected at these discontinuities, and estimating the size of these reflected waves using wave intensity analysis (WIA) is the main aim of this work. We also aim to measure wave speed, or pulse wave velocity (PWV) as more commonly known within the discontinuities. We manufactured 4 stenosis and 4 aneurism silicon sections, connected one at a time to a mother tube, and tested in vitro. Pressure and flow were measured proximal to the discontinuity
... Show MoreA potential alternative energy resource to meet energy demands is the vast amount of gas stored in hydrate reserves. However, major challenges in terms of exploration and production surround profitable and effective exploitation of these reserves. The measurement of acoustic velocity is a useful method for exploration of gas hydrate reserves and can be an efficient method to characterize the hydrate-bearing sediments. In this study, the compressional wave velocity (P-wave velocity) of consolidated sediments (Bentheimer) with and without tetrahydrofuran hydrate-bearing pore fillings were measured using the pulse transmission method. The study has found that the P-wave velocity of consolidated sediments increase with increasing hydrate format
... Show MoreE-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show MoreImage compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreA geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has
... Show More