The simulation of passively Q-switching is four non – linear first order differential equations. The optimization of passively Q-switching simulation was carried out using the constrained Rosenbrock technique. The maximization option in this technique was utilized to the fourth equation as an objective function; the parameters, γa, γc and β as were dealt with as decision variables. A FORTRAN program was written to determine the optimum values of the decision variables through the simulation of the four coupled equations, for ruby laser Q–switched by Dy +2: CaF2.For different Dy +2:CaF2 molecules number, the values of decision variables was predicted using our written program. The relaxation time of Dy +2: CaF2, used with ruby was calculated using the predicted value of γa.
Addition chloro acetyl isothiocyanate (C3H2ClNOS) with 3-Aminoaceto phenone (C8H9NO) to prepare a fresh Ligand [N-(3-acetyl phenyl carbamothioyl)-2-chloroacetamide](L). The ligand (L) behaves as bidentate coordinating through O and S donor with metal ions, the general formula of all complexes [M(L)2(Cl)2](M+2 = Manganese(II), Cobalt(II), Cadmium(II) and Mercury(II)). Compounds were investigation by Proton-1, Carbon -13 NMR spectra (ligand (L) only), Element Microanalysis for C, N, H, O, S, Fourier-transform infrared, UV visible, Conductance
The aim of this study was to evaluate the effects of local application of bisphosphonate gel and recombinant human bone morphogenic protein 2 gel, on titanium dental implant stability and marginal bone level. Twenty-seven patients with upper and lower missing posterior tooth/teeth were included in the study with a total of 71 implants that were used for rehabilitation. The implants were randomly divided into 4 groups: 3 study groups and 1 control. Group1; local application of bisphosphonate gel, group 2; local application of recombinant human bone morphogenic protein 2 gel, group 3; local application of a mixed formula of both gels. The gel application was immediately preimplant insertion, group 4; implant insertion without application of a
... Show MoreFour Co(II), (C1); Ni(II), (C2); Cu(II), (C3) and Zn(II), (C4) chelates have been synthesized with 1-(4-((2-amino- 5‑methoxy)diazenyl)phenyl)ethanone ligand (L). The produced compounds have been identified by using spectral studies, elemental analysis (C.H.N.O), conductivity and magnetic properties. The produced metal chelates were studied using molar ratio as well as sequences contrast types. Rate of concentration (1 ×10 4 - 3 ×10 4 Mol/L) sequence Beer’s law. Compound solutions have been noticed height molar absorptivity. The free of ligand and metal chelates had been applied as disperse dyes on cotton fabrics. Furthermore, the antibacterial activity of the produced compounds against various bacteria had been investigated. F
... Show MoreBackground: In the Thermafil as a root canal obturation, system little is known about the effect that varying rates of insertion have on the adaptability of thermoplasticized GP and the amount of apical extrusion. Materials and methods: thirty simulated root canals were obturated with thermafil obturators and Apexit Plus sealer at three different insertion rates. The obturated canals were sectioned at three different levels, the sealer average film thickness for each section was calculated and the amount of apical extrusion for each canal was conducted. Results: the higher adaptability was seen with the faster insertion rate while the slower insertion rate showed fewer tendencies to cause apical extrusion. Conclusions: the intermediate i
... Show MoreFounding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains
... Show MoreThe study aims to discuss the relation between imported inflation and international trade of Iraqi economy for the period (1990-2015) by using annual data. To achieve the study aim, statistical and Econometrics methods are used through NARDL model to explain non-linear relation because it’s a model assigned to measure non-linear relations and as we know most economic relations are non-linear, beside explaining positive and negative effects of imported inflation, and to reach the research aim deductive approach was adopted through using descriptive method to describe and determine phenomenon. Beside the inductive approach by g statistical and standard tools to get the standard model explains the
... Show MoreIncremental forming is a flexible sheet metal forming process which is performed by utilizing simple tools to locally deform a sheet of metal along a predefined tool path without using of dies. This work presents the single point incremental forming process for producing pyramid geometry and studies the effect of tool geometry, tool diameter, and spindle speed on the residual stresses. The residual stresses were measured by ORIONRKS 6000 test measuring instrument. This instrument was used with four angles of (0º,15º,30º, and 45º) and the average value of residual stresses was determined, the value of the residual stress in the original blanks was (10.626 MPa). The X-ray diffraction technology was used to measure the residual stresses
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More