Retreatment Efficacy of Continuous Rotation Versus Reciprocation Kinematic Movements in Removing Gutta-Percha with Calcium Silicate-Based Sealer: SEM Study, Raghad Noori Nawaf*, Ra
Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no
... Show MoreKE Sharquie, JR Al-Rawi, AA Noaimi, RA Al-Khammasi, Iraqi Journal of Community Medicine, 2018
Background : Although development and progress in various diagnostic methods, but still identification of remnants of skeletal and decomposing parts of human is one of the most difficult skills in forensic medicine . Gender and age estimation is also considering an important problem in the identification of unknown skull. The aims of study: To estimate volume and dimension of maxillary sinus in individuals with dentate and edentulous maxillae using CT scan, and to correlate the maxillary sinus volume in relation to gender and age. Materials and Methods : This study included 120 patients ranged from (40-69 years), divided into two groups, dentate group with fully dentate maxilla and edentulous group with complete edentulous maxilla, and e
... Show MoreThe search aims to clarify pollution to negative effects on environment and to an increasing in the dangerous polluted materials that discharged out these factories. To make active procedures in order to limit the environmental pollution.
The search problem came from an assumption which has the researched factory is suffering from the lack of applying the international specification ( ISO 14004 ). The research problem assimilated by these questions:
- What is the level or organization in thinking of environmental system according to ISO 14004 .
- What are the requirements used in researched factor