Abstract: Objectives: To investigate the effect of temperature elevation on the bonding strength of resin cement to the zirconia ceramic using fractional CO2 laser. Background: Fractional CO2 laser is an effective surface treatment of zirconia ceramic, as it increases the bonding strength of zirconia to resin cement. Methods: Thirty sintered zirconia discs (10 mm diameter, 2 mm thickness) were prepared and divided to three groups (N=10) and five diffident pulse durations were used in each group (0.1, 0.5, 1, 5 and 10 ms). Group A was treated with 10 W power setting, group B with 20 W and group C with 30 W. During laser irradiation, temperature elevation measurement was recorded for each specimen. Luting cement was bonded to the treated zirconia surfaces and cured for 30 seconds. Shear bond strength was evaluated by a testing machine (universal) with bond failure mode determination. Results: The lowest temperature elevation measurement of the irradiated specimen which gave maximum shear bond strength was about 1.6±0.3 Ċ higher than ambient room temperature (27±0.2 ºC). Apparent micromechanical irregularities were seen in the treated samples and cracks formation with increased pulse duration and power setting were also observed. Conclusions: The temperature elevation is a vital factor in the surface roughness of zirconia ceramic with fractional CO2 laser irradiation and the lowest temperature elevation at best shear bond strength of zirconia ceramic to the resin cement is satisfied with the shorter pulse duration of 0.1 millisecond.
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreProducing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce
... Show MoreRoller compacted concrete (RCC) is a concrete compacted by roller compaction. The concrete mixture in its unhardened state must support a roller while being compacted. The aim of this research work was to investigate the behavior and properties of roller compacted concrete when constructed in the laboratory using roller compactor manufactured in local market to simulate the field conditions. The roller compaction was conducts in three stages; each stage has different loading and number of passes of the roller. For the first stage, a load of (24) kg and (5) passes in each direction had been employed. For the second stage, a load of (104) kg and (10) passes in each direction were conducted. Finally, at the third stage, a load of (183) kg a
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
:
While practicing of International business particularly that centered on foreign direct investment, let on one side, to achieving objectives of transnational corporations specially that represented in continuous pursue to improving its cash flows and maximization of stockholders wealth which is considered the most important objective to the transnational corporations, but in the same time its lead, on other side, to increasing the foreign exchange risk exposuring these corporations. So, the transnational corporations (TNCs) struggling to make strategies which are dealing in smart way, with this risk and its management in way that enable to avoiding risk comple
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe main purpose of the work is to analyse studies of themagnetohydrodynamic “MHD” flow for a fluid of generalized Burgers’ “GB” within an annular pipe submitted under impulsive pressure “IP” gradient. Closed form expressions for the velocity profile, impulsive pressure gradient have been taken by performing the finite Hankel transform “FHT” and Laplace transform “LT” of the successive fraction derivatives. As a result, many figures are planned to exhibit the effects of (different fractional parameters “DFP”, relaxation and retardation times, material parameter for the Burger’s fluid) on the profile of velocity of flows. Furthermore, these figures are compa
In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.