In this work the interaction of plasma jet with water and hydrogen peroxide liquids used for assisted teeth bleaching by plasma jet had been study. A homemade plasma jet system was used. The plasma jet supply by 15 W electrical power generated by high voltage power supply of 9.6 kV peak to peak and frequency of 33 kHz .this power supply generate high electric field on electrodes that would be enough to ionize the argon gas. Some important agents were study such as the effect of the Ar gas flow rates on the length of the plasma jet, the influence of plasma jet on some properties of water and two hydrogen peroxide concentrations 25 % and 30 % like pH, conductivity and liquid temperature for different exposure time. The liquids temperature
... Show MoreThe Symbolic Interaction of the Kindergarten
The current study was conducted with the aim of fortifying meat burger with the protein isolate extracted from defatted sweetened and unsweetened apricot kernels. The antimicrobial activity of defatted apricot kernels and protein isolates of sweetened and unsweetened kernels against some pathogenic microbes was studied, and it was characterized by its effect on gram-positive bacteria more than gram-negative bacteria. As for its effect on yeast, the inhibition diameter was 4.5 mm at a concentration of 200 mg for the unsweetened protein isolate. As for its effect on mold, the inhibition percentage was between 56.05 65.21% for all samples at a concentration of 100 mg. The sweetened and unsweetened protein isolate was used in the manufact
... Show MoreGingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreAbstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.