Aim: surface modification of titanium using fiber laser 1064 nm to enhance the bond strength to resin cement. Material and Methods: thirty titanium discs of 0.6 cm x 0.3 cm (diameter and thickness respectively) were categorized after preparation into three groups (n=10) as follows: control group with no surface treatment and two test groups were treated with fiber laser after estimation the appropriate parameters in the pilot study which are 81 ns pulse duration, 30,000 Hz frequency, 50 µm spot size and 10,000 mm/s scanning speed and different average power values (10 W and 20 W) depending on the tested group. Titanium discs surface characterization was performed by scanning electron microscope (SEM), and surface roughness tester. Following these tests, resin cement application to titanium discs was performed. Shear bond strength (SBS) values were determined by universal testing machine. ANOVA and Tukey HSD tests were used for analyzing of data (α = 0.05).Results: Higher average surface roughness (Ra) value was observed in (10 W) group followed by (20 W) group and the lowest surface roughness value was in the control group, additionally lowest SBS value was obtained from the control group and the highest SBS value was obtained from (20 W) group followed by (10 W) group. Conclusion: bond strength between titanium and resin cement can be significantly enhanced by using fiber laser as a surface treatment. Average power of fiber laser is essential parameter in enhancing the roughness of titanium surface and bonding to resin cement.
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreDespite efforts to contain and manage the SARS-CoV-2 outbreak which was declared a public health emergency of international concern in January 2020 by the World Health Organization (WHO), the COVID-19 pandemic still remains a major global challenge. Patients who display the classical symptoms of the infection are easily identified, tested, isolated and monitored. However, many cases of infected asymptomatic patients have been documented. These patients are not easily identified even though many evidences suggest that they can spread the virus to others. How and why these COVID-19 asymptomatic presentations occur remain unclear. The many theories and views are conjectural, and supporting evidences are still needed. In this review, we
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreThe study aimed at ideutifying the impact of scieutific skills in strategy and liabits of mind amony stueuts in tenth grade . The study demanded to choose a sampie that coutaiun (42) student of the fourth grade of the secondary school who were dirided into tow groups , the first is experimental studied according to scieutific skill strategy , and the other controlling , studied according to the usualway . An achievement test has been taken that adopted staudard for mind skills as research tools that are applid after ascertaining sincerity proved at the end of the experiment .The study has reached to the conclusion that there are statistically significant differnces in farour of the experiment group in both
... Show More