Although the number of implants has increased gradually and consistently over the years to around one million per year globally, there is still far more potential for advancement in the field of dental implantology which is typically growing quickly. This study investigates the effect of nanofiller reinforcement high-performance polymer matrix to enhance mechanical and physical characteristics. Calcium silicate (CS)/Polyetherketoneketone (PEKK) biomedical composite (G0 as a control group) is reinforced with different weight percentages (G1-G4) of tellurium dioxide nanoparticles (TeO2NPs) ( n = 5). This research uses ethanol as a binder for mixing various weight percentages (wt%) of TeO2NPs with CS/PEKK biomedical composite. The combination is then dried at 120°C in a forced convection oven before being put into special molds and compressed for 20 min Holding period at 310°C and 15 MPa. The composites were prepared via the compression molding technique. Morphological, mechanical, and physical characteristics were studied. The findings of this study suggested improvement in the interfacial interaction between TeO2NPs (G1 and G2) and CS/PEKK bioactive composite resulting in better mechanical and physical properties, especially at 1 w% of TeO2NPs (G2).
Mass transfer has been studied at rotating cylinder electrodes fabricated with spiral-wound woven-wire meshes using reduction of copper as a test reaction. The experimental data were correlated by an empirical expression between the Sherwood number and the Reynolds number, both regarding the hydraulic diameter as a characteristic length. It was found that the Sherwood number was dependent upon the Reynolds number to the power of 0.521. An enhancement factor was adopted to compare the efficiency of the new rotating cylinder electrode with previous three-dimensional rotating cylinder electrodes. The results showed that the new type has a mass-transfer enhancement factor 2.3 times higher than those obtained with smooth rotating cylinder electr
... Show MoreIn this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those methods i
... Show MoreThe influence and hazard of fire flame are one of the most important parameters that affecting the durability and strength of structural members. This research studied the influence of fire flame on the behavior of reinforced concrete beams affected by repeated load. Nine self- compacted reinforced concrete beams were castellated, all have the same geometric layout (0.15x0.15x1.00) m, reinforcement details and compressive strength (50 Mpa).
To estimate the effect of fire flame disaster, four temperatures were adopted (200, 300, 400 and 500) oC and two method of cooling were used (graduated and sudden). In the first cooling method, graduated, the tested beams were leaved to cool in air while in the seco
... Show MoreA total of 680 fish specimens belonging to 31 species from the Yemeni coastal waters of the Red Sea were inspected for the isopod infestations. Four isopod species belonging to three families of the suborder Cymothoida were detected. These are: Aega psora (Linnaeus, 1758) from Lethrinus lentjan, Natatolana insignis Hobbins and Jones, 1993 from Abalistes stellatus, Excorallana tricornis (Hansen, 1890) from Epinephelus fuscoguttatus, E. guttatus and E. tauvina and Alcirona krebsi Hansen, 1890 from Epinephelus microdon. All these isopod species are reported here for the first time from the Yemeni coastal waters of the Red Se
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThis paper investigates the experimental response of composite reinforced concrete with GFRP and steel I-sections under limited cycles of repeated load. The practical work included testing four beams. A reference beam, two composite beams with pultruded GFRP I-sections, and a composite beam with a steel I-beam were subjected to repeated loading. The repeated loading test started by loading gradually up to a maximum of 75% of the ultimate static failure load for five loading and unloading cycles. After that, the specimens were reloaded gradually until failure. All test specimens were tested under a three-point load. Experimental results showed that the ductility index increased for the composite beams relative to the reference specim
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show More