Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
Background: The finite element method (FEM) is expected to be one of the most effective computational tools for measuring the stress on implant-supported restorations. This study was designed using the 3D-FEM to evaluate the effect of two adhesive luting types of cement on the occlusal stress and deformation of a hybrid crown cemented to a mono-implant. Materials and Method: The mono-screw STL file was imported into the CAD/CAM system library from a database supported by De-Tech Implant Technology. This was to assist in the accurate reproduction of details and design of a simulated implant abutment. Virtually, a digital crown was designed to be cemented on an abutment screw. A minimum occlusal thickness of 1mm and marginal fitting of 1.2
... Show MoreFunctionally graded materials (FGMs), with ceramic –ceramic constituents are fabricated using powder technology techniques. In this work three different sets of FGMs samples were designed in to 3 layers, 5 layers and 7 layers. The ceramic constituents were represented by hard ferrite (Barium ferrite) and soft ferrite (lithium ferrite). All samples sintered at constant temperature at 1100oC for 2 hrs. and characterized by FESEM. Some physical properties were measured for fabricated FGMs include apparent density, bulk density, porosity, shrinkage and hardness. The results indicated that the density increase with the increase the number of layer. Lateral shrinkage is one of the important parameter f
... Show MoreFind goal to detect educational and technical staffing of style fiction in book reading school materials so determine the current research on the specific book reading in fourth grade of primary for the academic year 2014 issued by the Ministry of Education / Republic Iraq stories. Come in the importance of research to draw attention to the best of these stories and strengthened, and the negative deny it and claim his deportation in order to protect the thought of the learner, and the study may contribute to the development of some frameworks to write a story appropriate for elementary school. This McCann within the first chapter The second chapter included the theoretical framework has been contained on two main sections included the co
... Show MoreThe influence of Cr3+ doping on the ground state properties of SrTiO3 perovskite was evaluated using GGA-PBE approximation. Computational modeling results infered an agreement with the previously published literature. The modification of electronic structure and optical properties due to Cr3+ introducing into SrTiO3 were investigated. Structural parameters assumed that Cr3+ doping alters the electronic structures of SrTiO3 by shifting the conduction band through lower energies for the Sr and Ti sites. Besides, results showed that the band gap was reduced by approximately 50% when presenting one Cr3+ atom into the SrTiO3 system and particularly positioned at Sr sites. Interestingly, substituting Ti site by Cr3+ led to eliminating the band ga
... Show MoreThis study relates to the estimation of a simultaneous equations system for the Tobit model where the dependent variables ( ) are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method and Two- Stage limited dependent variables(2SLDV) method to get of estimators that hold characteristics the good estimator .
That is , parameters will be estim
... Show MoreThe use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Lately great interests have emerged to find educational alternatives to teach and improve motor skills according to modern educational methods that take into account individual differences and speed in learning for the learner through individual learning that the learner adopts by teaching himself by passing through various educational situations to acquire skills and information in the way he is The learner is the focus of the educational process and among these alternatives the interactive video, the researchers noted through the educational training units at the Model Squash School of the Central Union, and that most of the methods and methods used in learning basic skills take a lot of time in the educational program and do not involve
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show More