Stereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA type based on light curing resin and material overview is also presented. Moreover, the survey was conducted to gain substantial knowledge of the various advantages and disadvantages of SLA 3D printing. According to this study, a summary has been specified on the accuracy of SLA 3D printers and various factors that affected its accuracy and dimension measurement namely layer thickness, normal exposure time, bottom or top exposure time, post processing and room temperature. The majority of works in the literatures conducted till date are on improving the physical part attributes like dimensional accuracy and surface roughness but the improving of the mechanical properties have received less attention and need more focusing in the future works.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MorePurpose: The present study seeks to examine various history stages in which undergone by the concept of scenarios, and development of this concept to integration with the strategic management practices:
Methodology: The current study relied on a literature review and approach in providing total picture of different stages undergone by this concept.
The main results: the scenarios did not reach maturity in their quest for integration with strategic management, and still need a great effort for the maturation of this thought in the framework of strategic management, and through it can contribute in creating important knowledge evolution.
Originality and value: providing a contemporary model linking the roots of this concept and cu
Abstract
Agricultural investment is one of the main requirements in most economies of the world for its importance in the development of the agricultural sector through the agricultural and technological infrastructure and agricultural research, as well as its impact on most economic, social and service activities, especially if managed and employed scientifically, which generates income and productive capacities and services and new commodities, Unemployed as agricultural investments in Iraq fell significantly after 2003 due to economic, political, social
Abstract
The aim of the research is to develop specific skills of 21 century, one schedule, renewable: (sex, years of experience, academic degree) from the viewpoint of the research sample. The descriptive tool was used to collect information for research purposes. It was applied to a sample of (339) male and female teachers in Al-Ardhah governorate schools to teach Jazan. The application was carried out in the second semester of the year 1442 AH. The research concluded with a set of results, the most important of which are: the approval of the sample members to a large extent on the expressions of the role of school leaders in the practice of developing male and female teachers in acquiring these three skills fr
... Show MoreAims of this research to determine asbestos fibers levels in surrounding air of some crowded sites of Baghdad city were monitored in summer 2020. Collection of samples was conducted by directing air flow to a mixed cellulose ester membrane filter mounted on an open‑faced filter holder using sniffer a low flow sampling pump, samples of air were collected from five studied areas selected in some heavy traffic areas of Baghdad city, (Al-Bayaa and Al-Shurta tunnel, Al-Jadriya, and Al-Meshin commercial complex, control), then analyzed to determine concentrations of asbestos fibers. Counting of asbestos on the filters was carried out through using both scanning electron microscope SEM and an energy dispersive X‑ray system EDS to count
... Show MoreScholars have inherited a tremendous wealth in all sciences and knowledge, especially jurisprudence; therefore, the students of forensic science had to execute this precious heritage, achieving a serious scientific investigation; So I opted for the realization of this part of the Book of Leasing for the small book of fatwas of Yusuf bin Ahmed al-Khasi.
In this paper we generalize Jacobsons results by proving that any integer in is a square-free integer), belong to . All units of are generated by the fundamental unit having the forms
Our generalization build on using the conditions
This leads us to classify the real quadratic fields into the sets Jacobsons results shows that and Sliwa confirm that and are the only real quadratic fields in .