LK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2
Background: Many materials were proposed as root canal obturating materials but the biocompatibility issue remains to be a critical one. Propolis has been used as a therapeutic agent since the time of Hippocrates. It is known that propolis exhibits some pharmacological activities, such as antibacterial, antiviral, antifungal and anti inflammatory activity. Materials and methods: Eighteen albino rats were used in the study and divided randomly into three groups of 6 animals for each group. Each group was scheduled to be sacrificed at different time periods, which were three days, one week and three weeks. Propolis and ZOE sealer implants of 4mm in diameter and 0.5 gm in weight were implanted in the dorsal side of the rats. At the end of the
... Show MoreIn this work, solid random gain media were fabricated from laser dye solutions containing nanoparticles as scattering centers. Two different rhodamine dyes (123 and 6G) were used to host the highly-pure titanium dioxide nanoparticles to form the random gain media. The spectroscopic characteristics (mainly fluorescence) of these media were determined and studied. These random gain media showed laser emission in the visible region of electromagnetic spectrum. Fluorescence characteristics can be controlled to few nanometers by adjusting the characteristics of the host and nanoparticles as well as the preparation conditions of the samples. Emission of narrow linewidth (3nm) and high intensity in the visible region (533-537nm) was obtained.
In this work, solid random gain media were fabricated from laser dye solutions containing nanoparticles as scattering centers. Two different rhodamine dyes (123 and 6G) were used to host the highly-pure titanium dioxide nanoparticles to form the random gain media. The spectroscopic characteristics (mainly fluorescence) of these media were determined and studied. These random gain media showed laser emission in the visible region of electromagnetic spectrum. Fluorescence characteristics can be controlled to few nanometers by adjusting the characteristics of the host and nanoparticles as well as the preparation conditions of the samples. Emission of narrow linewidth (3nm) and high intensity in the visible region (533-537nm) was obtained.
This paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreQuadrotors are coming up as an attractive platform for unmanned aerial vehicle (UAV) research, due to the simplicity of their structure and maintenance, their ability to hover, and their vertical take-off and landing (VTOL) capability. With the vast advancements in small-size sensors, actuators, and processors, researchers are now focusing on developing mini UAV’s to be used in both research and commercial applications. This work presents a detailed mathematical nonlinear dynamic model of the quadrotor which is formulated using the Newton-Euler method. Although the quadrotor is a 6 DOF under-actuated system, the derived rotational subsystem is fully actuated, while the translational subsystem is under-actuated. The der
... Show MoreCommunity detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a
... Show MoreVariable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show More