Background: Poly (methyl methacrylate) has been widely utilized for fabrication of dentures for many years as it has good advantages but not achieved all demands of the mechanical properties such as low transverse strength, low impact strength, low surface hardness, high water solubility and high water sorption. Material and method: To provide bonding between ZrO2 nanoparticles and PMMA matrix, the ZrO2 Nano-fillers were surface-treated with a saline coupling agent. Plasma surface treatment of polyethylene (PE) fiber was done to change surface fiber by using DC- glow discharge system. For characterization of interring any functional groups, the (FTIR) spectrum were done .then the mechanical properties studied to choose the appropriate perc
... Show MoreRutting is a crucial concern impacting asphalt concrete pavements’ stability and long-term performance, negatively affecting vehicle drivers’ comfort and safety. This research aims to evaluate the permanent deformation of pavement under different traffic and environmental conditions using an Artificial Neural Network (ANN) prediction model. The model was built based on the outcomes of an experimental uniaxial repeated loading test of 306 cylindrical specimens. Twelve independent variables representing the materials’ properties, mix design parameters, loading settings, and environmental conditions were implemented in the model, resulting in a total of 3214 data points. The network accomplished high prediction accuracy with an R
... Show MoreProductivity estimating of ready mixed concrete batch plant is an essential tool for the successful completion of the construction process. It is defined as the output of the system per unit of time. Usually, the actual productivity values of construction equipment in the site are not consistent with the nominal ones. Therefore, it is necessary to make a comprehensive evaluation of the nominal productivity of equipment concerning the effected factors and then re-evaluate them according to the actual values.
In this paper, the forecasting system was employed is an Artificial Intelligence technique (AI). It is represented by Artificial Neural Network (ANN) to establish the predicted model to estimate wet ready mixe
... Show MoreWe demonstrate the results of a mathematical model for investigation the nonlinear Stimulated Brillouin Scattering (SBS), which can be employed to achieve high optical amplifier. The SBS is created by interaction between the incident We demonstrate the results of a mathematical model for investigation the nonlinear Stimulated Brillouin Scattering (SBS), which can be employed to achieve high optical amplifier. The SBS is created by interaction between the incident light and the acoustic vibration fiber. The design criteria and the amplification characteristic of the Brillouin amplifier is demonstrated and discussed for fiber Brillouin amplifier using different pump power with different fiber length. The results show, high Brillouin gain can
... Show MoreHollow core photonic bandgap fibers provide a new geometry for the realization and enhancement of many nonlinear optical effects. Such fibers offer novel guidance and dispersion properties that provide an advantage over conventional fibers for various applications. Dispersion, which expresses the variation with wavelength of the guided-mode group velocity, is one of the most important properties of optical fibers. Photonic crystal fibers (PCFs) offer much larger flexibility than conventional fibers with respect to tailoring of the dispersion curve. This is partly due to the large refractive-index contrast available in the silica/air microstructures, and partly due to the possibility of making complex refractive-index structure over the fibe
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.