Many authors investigated the problem of the early visibility of the new crescent moon after the conjunction and proposed many criteria addressing this issue in the literature. This article presented a proposed criterion for early crescent moon sighting based on a deep-learned pattern recognizer artificial neural network (ANN) performance. Moon sight datasets were collected from various sources and used to learn the ANN. The new criterion relied on the crescent width and the arc of vision from the edge of the crescent bright limb. The result of that criterion was a control value indicating the moon's visibility condition, which separated the datasets into four regions: invisible, telescope only, probably visible, and certainly visible. This criterion was used on the dataset for ANN learning to compare its efficiency with the actual moon visibility events.
Background: The purpose of this study was to evaluate the effect of in vitro long-term simulation of oral conditions on the bond strength of PEEK CAD/CAM lingual retainers.
Material and methods: The sample consisted of 12 PEEK CAD/CAM retainers each composed of 2 centrally perforated 3x4mm pads joined by a connector. They were treated by 98% sulfuric acid for 1 minute and then conditioned with Single Bond Universal and bonded to the lingual surface of premolar teeth by 3M Transbond TM System. Half of the retainers were artificially aged using a 30-day water storage and 5000 thermocycling protocol before bond strength testing to compare with the non-aged specimens.
Results: The artificially aged retainers showed a marginally
... Show MoreExperimental and numerical studies have been conducted on the effects of bed roughness elements such as cubic and T-section elements that are regularly half-channel arrayed on one side of the river on turbulent flow characteristics and bed erosion downstream of the roughness elements. The experimental study has been done for two types of bed roughness elements (cubic and T-section shape) to study the effect of these elements on the velocity profile downstream the elements with respect to different water flow discharges and water depths. A comparison between the cubic and T-section artificial bed roughness showed that the velocity profile downstream the T-section increased in smooth side from the river and decrease in the rough side
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreArtificial fish swarm algorithm (AFSA) is one of the critical swarm intelligent algorithms. In this
paper, the authors decide to enhance AFSA via diversity operators (AFSA-DO). The diversity operators will
be producing more diverse solutions for AFSA to obtain reasonable resolutions. AFSA-DO has been used to
solve flexible job shop scheduling problems (FJSSP). However, the FJSSP is a significant problem in the
domain of optimization and operation research. Several research papers dealt with methods of solving this
issue, including forms of intelligence of the swarms. In this paper, a set of FJSSP target samples are tested
employing the improved algorithm to confirm its effectiveness and evaluate its ex
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreNumerous regions in the city of Baghdad experience the congestion and traffic problems. Due to the religious and economic significance, Al-Kadhimiya city (inside the metropolitan range of Baghdad) was chosen as study area. The data gathering stage was separated into two branches: the questionnaire method which is utilized to estimate the traffic volumes for the chosen roads and field data collection method which included video recording and manual counting for the volumes entering the selected signal intersections. The stage of analysis and evaluation for the seventeen urban roads, one highway, and three intersections was performed by HCS-2000 software.The presented work plots a system for assessing the level of service
... Show More<span lang="EN-US">Iraqi people have been without energy for nearly two decades, even though their geographic position provides a high intensity of radiation appropriate for the construction of solar plants capable of producing significant quantities of electricity. Also, the annual sunny hours in Iraq are between 3,600 to 4,300 hours which makes it perfect to use the photovoltaics arrays to generate electricity with very high efficiency compared to many countries, especially in Europe. This paper shows the amount of electric energy generated by the meter square of crystalline silicon in the photovoltaic (PV) array that already installed in 18 states in Iraq for each month of the year. The results of the meter-square of PV arr
... Show More