The present work involved preparation of new substituted and unsubstituted and poly imides (1-17) using reaction of acryloyl chloride with different amides (aliphatic ,aromatic) in the presence of a suitable solvent and amount tri ethyl amine (Et3N) with heating – the structure confirmation of all polymers were proved using FT-IR,1H-NMR,C13NMR and UV spectroscopy ,thermal analysis (TG) for some polymers confirmed their thermal stabilities . Other physical properties including softening and melting points, PH and solubility of the polymers were also measured
Background: Change in palatal vault shape and Reinforcement of high impact acrylic denture base resin may in turn affect the dimensional accuracy of acrylic resin and affecting the fitness of the denture.This study evaluated tostudy the effect of fiber reinforcement for high-impact acrylic resin denture base with different palatal vault shapes on adaptation or gap space between the denture base and the stone cast and compare with non-fiber reinforcement and effect of palatal vault shapes on adaptation of non-reinforced and fiber reinforced high impact denture base acrylic resin Material and method: Three different palatal vault shapes were prepared on standard casts using CNC (computer numerical control) machine. 60 samples of heat polymeri
... Show MoreBackground: Change in palatal vault shape and Reinforcement of high impact acrylic denture base resin may in turn affect the dimensional accuracy of acrylic resin and affecting the fitness of the denture. The aim of study is to evaluate the effect of fiber reinforcement for high-impact acrylic resin denture base with different palatal vault shapes on linear dimensional change and effect of palatal vault shapes on linear dimensional changes of non-reinforced and fiber reinforced high impact denture base acrylic resin Material and method: Three different palatal vault shapes were prepared on standard casts using CNC (computer numerical control) machine. 60 samples of heat polymerized high impact acrylic resin maxillary denture base were fabri
... Show MoreABSTRACT Background: This study measured the effects of three parameters pH value, length of immersion and type of archwire on metal ions released from orthodontic appliances. Materials and Methods: Ninety maxillary halves simulated fixed orthodontic appliances that were immersed in artificial saliva of different pH values (6.75, 5 and 3.5) during 28 day period. Three types of archwires were used: stainless steel, nickel titanium and thermal activated nickel titanium. The quantity of nickel and chromium ions was determined with the use of atomic force spectrophotometer while iron ions by spectrophotometer. Each orthodontic set was weighted two times, before the ligation and immersion in the artificial saliva and after 28 days at the end of
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Since the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show More* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2
The main objective of this work is to introduce and investigate fixed point (F. p) theorems for maps that satisfy contractive conditions in weak partial metric spaces (W.P.M.S), and give some new generalization of the fixed point theorems of Mathews and Heckmann. Our results extend, and unify a multitude of (F. p) theorems and generalize some results in (W.P.M.S). An example is given as an illustration of our results.