Objective This study evaluated the effects of adding titanium oxide (TiO2) nanofillers on the tear strength, tensile strength, elongation percentage, and hardness of room-temperature-vulcanized (RTV) VST50F and high-temperature-vulcanized (HTV) Cosmesil M511 maxillofacial silicone elastomers. Methods Two types of maxillofacial elastomers, VST50F RTV and Cosmesil M511 HTV, were used. Nano-TiO2 powder was applied as a nanofiller. A total of 120 specimens were fabricated, 60 each of VST50F and Cosmesil M511. The specimens of each type of elastomer were divided into three equal groups on which tests were conducted for tear strength, tensile strength, and hardness i.e., 20 specimens were used for each test. Each group of 20 specimens was further divided into two equal subgroups: (A) control i.e., silicone without nano-TiO2, and (B) experimental i.e., VST50F and Cosmesil M511 silicone incorporated with 0.25 wt% and 0.2 wt% nano-TiO2, respectively. Each subgroup thus had 10 specimens. The specimens were evaluated, and data were studied using descriptive statistical analysis and two-way analysis of variance (ANOVA). Results The addition of 0.25 wt% and 0.2 wt% TiO2 nanofiller into VST50F and Cosmesil M511 elastomers, respectively, resulted in a statistically significant increase in the mean values (p < 0.01) of tear strength, tensile strength, elongation percentage, and hardness of the materials. Conclusion The mechanical properties of the VST50F and Cosmesil M511 maxillofacial silicone materials improved with the addition of select concentrations of nano-TiO2.
The university Service employee is considered one of the categories of public employees, However, The academic and administrative tasks duties that undertakes have made him a special importance and a distinguished legal status, Therefore, we find That the Iraqi legislatures assigned this category a special Law, it is the university Service law No (23) of 2008 as amended who dealt with some aspects related to serving this category, such as duties, right, condition for appointment and award of academic titles, and financial allocation, such as university service allocation, academic title allocations, and some other Provisions leaving other matters to the general service laws and employee discipline, among the matters that the legislator negl
... Show MoreA true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems
The Islamic Bank of Al-Nahrain offers a formula for financing the purchase of real estate through a deferred sale contract, through Murabaha to the order to buy, and the payment of the price is in the form of instalments that include (the purchase price of the profit and the mutual agreement on the real estate). This research aims to show the reflection of real estate murabaha on the bank's investments, by measuring the effect of real estate murabaha on the profits achieved by the Islamic Bank of Al-Nahrain Bank. The growth of 'real estate murabaha' realized from the 'amounts granted by Bank X, in addition to analyzing the financial ratios of profitability indicators, including (return on deposits Y2) and for the years (2016 - 20
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
Error control schemes became a necessity in network-on-chip (NoC) to improve reliability as the on-chip interconnect errors increase with the continuous shrinking of geometry. Accordingly, many researchers are trying to present multi-bit error correction coding schemes that perform a high error correction capability with the simplest design possible to minimize area and power consumption. A recent work, Multi-bit Error Correcting Coding with Reduced Link Bandwidth (MECCRLB), showed a huge reduction in area and power consumption compared to a well-known scheme, namely, Hamming product code (HPC) with Type-II HARQ. Moreover, the authors showed that the proposed scheme can correct 11 random errors which is considered a high
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreBearing capacity of soil is an important factor in designing shallow foundations. It is directly related to foundation dimensions and consequently its performance. The calculations for obtaining the bearing capacity of a soil needs many varying parameters, for example soil type, depth of foundation, unit weight of soil, etc. which makes these calculation very variable–parameter dependent. This paper presents the results of comparison between the theoretical equation stated by Terzaghi and the Artificial Neural Networks (ANN) technique to estimate the ultimate bearing capacity of the strip shallow footing on sandy soils. The results show a very good agreement between the theoretical solution and the ANN technique. Results revealed that us
... Show More