Aim: surface modification of titanium using fiber laser 1064 nm to enhance the bond strength to resin cement. Material and Methods: thirty titanium discs of 0.6 cm x 0.3 cm (diameter and thickness respectively) were categorized after preparation into three groups (n=10) as follows: control group with no surface treatment and two test groups were treated with fiber laser after estimation the appropriate parameters in the pilot study which are 81 ns pulse duration, 30,000 Hz frequency, 50 µm spot size and 10,000 mm/s scanning speed and different average power values (10 W and 20 W) depending on the tested group. Titanium discs surface characterization was performed by scanning electron microscope (SEM), and surface roughness tester. Following these tests, resin cement application to titanium discs was performed. Shear bond strength (SBS) values were determined by universal testing machine. ANOVA and Tukey HSD tests were used for analyzing of data (α = 0.05).Results: Higher average surface roughness (Ra) value was observed in (10 W) group followed by (20 W) group and the lowest surface roughness value was in the control group, additionally lowest SBS value was obtained from the control group and the highest SBS value was obtained from (20 W) group followed by (10 W) group. Conclusion: bond strength between titanium and resin cement can be significantly enhanced by using fiber laser as a surface treatment. Average power of fiber laser is essential parameter in enhancing the roughness of titanium surface and bonding to resin cement.
The interest in the intellectual capital and its development is a civilized necessity imposed by the requirements of the times and cannot imagine an advanced society in its potential productivity in poor efficiency of human capital, and features the work environment change permanently, putting the management of financial companies against a constant challenge toward coping with new developments in this changing environment and this is not taken unless owned by these companies qualified human resources and the provision of Culture organizers have, which manifested itself with the research problem by the following two questions:
- Did the intellectual capital value specific financial and
The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
Positron annihilation lifetime has been utilized for the first time to investigate the free - volume hole properties in thermolumenscent dosimeter ( TLD ) as a function of gamma-dosc . The hole volume, free volume fraction determined form orthopsitronium lifetime are found to be ?lamatically increase to large values , and then to minimum values as a function ofgamma-dose . The free - volume holes size is found to be 0.163nm’ and to have maximum of 0.166nm^ at the gamma-dose of 0.1 and 0.8 Gy, respectively-
The cheif aim of the present investigation is to develop Leslie Gower type three species food chain model with prey refuge. The intra-specific competition among the predators is considered in the proposed model. Besides the logistic growth rate for the prey species, Sokol Howell functional response for predation is chosen for our model formulation. The behaviour of the model system thoroughly analyses near the biologically significant equilibria. The linear stability analysis of the equilibria is carried out in order to examine the response of the system. The present model system experiences Hopf bifurcation depending on the choice of suitable model parameters. Extensive numerical simulation reveals the validity of the proposed model.
The Ottomans ruled Turkey for nearly six centuries, during which the Ottoman Empire passed through varying periods in terms of strength, influence, and the area of land they ruled. In the last decade of its rule, the Ottoman Empire was severely weakened in all political, military, administrative and economic aspects. In addition to the internal strife that was stirred up by the leaders of the Association (Union and Progression), that organization that led the coup movement against the Ottoman Empire later.
After the abolition of the Sultanate and the proclamation of the Turkish Republic, the social fabric in Turkey changed, and many customs and traditions alien to it emerged to society. One of the thing
... Show MoreAn accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show More