Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors
Objectives: To review the failure rates of molar tubes and the effect of molar tube base design, adhesive type, and bonding technique on the failure rates of molar tubes. Data: The revolution of molar bonding greatly impacted fixed orthodontic appliance treatment by reducing chair-side time and improving patient comfort. Even with the many advantages of molar bonding, clinicians sometimes hesitate to use molar tubes due to their failure rates. Sources: Internet sources, such as Pubmed and Google Scholar. Study selection: studies testing the bond failure rate of molar tubes. Conclusions: The failure rate of the molar tubes can be reduced and the bond strength of the molar tubes can be improved by changing the design of the molar tube base
... Show MoreIn Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interview
... Show MoreThe aim of this book is to present a method for solving high order ordinary differential equations with two point boundary condition of the different kind, we propose semi-analytic technique using two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, we discussion the existence and uniqueness of solutions and many examples are presented to demonstrate the applicability, accuracy and efficiency of the methods by compared with conventional method .i.e. VIDM , Septic B-Spline , , NIM , HPM, Haar wavelets on one hand and to confirm the order convergence on the other
... Show MoreThis paper investigates an effective computational method (ECM) based on the standard polynomials used to solve some nonlinear initial and boundary value problems appeared in engineering and applied sciences. Moreover, the effective computational methods in this paper were improved by suitable orthogonal base functions, especially the Chebyshev, Bernoulli, and Laguerre polynomials, to obtain novel approximate solutions for some nonlinear problems. These base functions enable the nonlinear problem to be effectively converted into a nonlinear algebraic system of equations, which are then solved using Mathematica®12. The improved effective computational methods (I-ECMs) have been implemented to solve three applications involving nonli
... Show MoreWhen scheduling rules become incapable to tackle the presence of a variety of unexpected disruptions frequently occurred in manufacturing systems, it is necessary to develop a reactive schedule which can absorb the effects of such disruptions. Such responding requires efficient strategies, policies, and methods to controlling production & maintaining high shop performance. This can be achieved through rescheduling task which defined as an essential operating function to efficiently tackle and response to uncertainties and unexpected events. The framework proposed in this study consists of rescheduling approaches, strategies, policies, and techniques, which represents a guideline for most manufacturing companies operatin
... Show MoreThis review is concluded of 8-Hydroxyquinline (8HQ) compound and derivatives which has a very significant interests with a strong fluorescence , furthermore the relationship between divalent metal ions and characteristic of chelating . In the same way coordinated features have increase of its organic action and inorganic behavior by giving many samples of compounds which are a good chelating agents ligands with more capable of forming very stable complexes.Therefore, the role of (8HQ) is not limited on complexes only but its applications in different fields so this review will focus on demonstration preparation methods and properties of (8HQ) derivatives with their complexes and applications, hopefully that we will cover a part of scientifi
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The problem of the research lies in the bad timing of jump shot and layup due to lack of experience. The subjects were (5) youth basketball players under eighteen of the season 2015 – 2016. The results showed that agility didn't reinforce some fundamental offensive skills ending in jump shot and layup. The researcher recommended stressing offensive fundamental skills ending jump shot and layup without connecting it with agility. The training experience of most players participating in basketball league is very little thus more time should be offered to them before getting them into the league.