Aim: surface modification of titanium using fiber laser 1064 nm to enhance the bond strength to resin cement. Material and Methods: thirty titanium discs of 0.6 cm x 0.3 cm (diameter and thickness respectively) were categorized after preparation into three groups (n=10) as follows: control group with no surface treatment and two test groups were treated with fiber laser after estimation the appropriate parameters in the pilot study which are 81 ns pulse duration, 30,000 Hz frequency, 50 µm spot size and 10,000 mm/s scanning speed and different average power values (10 W and 20 W) depending on the tested group. Titanium discs surface characterization was performed by scanning electron microscope (SEM), and surface roughness tester. Following these tests, resin cement application to titanium discs was performed. Shear bond strength (SBS) values were determined by universal testing machine. ANOVA and Tukey HSD tests were used for analyzing of data (α = 0.05).Results: Higher average surface roughness (Ra) value was observed in (10 W) group followed by (20 W) group and the lowest surface roughness value was in the control group, additionally lowest SBS value was obtained from the control group and the highest SBS value was obtained from (20 W) group followed by (10 W) group. Conclusion: bond strength between titanium and resin cement can be significantly enhanced by using fiber laser as a surface treatment. Average power of fiber laser is essential parameter in enhancing the roughness of titanium surface and bonding to resin cement.
Background: The use of antiepileptic drugs (AEDs) during pregnancy warrants several side effects and also deleterious effects on fetal development, the antiepileptic drugs have potential to affect the fetal development throughout the pregnancy although, the majority of infants born to epileptic pregnant women are normal but more expose to the malformations. Aim: The present study aimed to investigate the effect of carbamazepine drug on the kidney development at day 7 postnatally in the Albino Rat (Rattus rattus) as a mammalian model. Material & Methods: 20 healthy pregnant female rats were divided into two groups, 10 pregnant rats in each group; group one served as control group administrated distal water while group two used as experimenta
... Show MoreThe Arab-Israeli conflict passed through several stages before reaching the final stage of normalization, namely conflict, conflict and public normalization. Thus, the UAE became the third country to establish official relations with Israel after Egypt in 1979 and Jordan in 1994. With the announcement of the normalization agreement, opinions varied between supporters and opponents of the idea of normalization with Israel, and some countries expressed their acceptance of establishing official relations between the Emirates and Israel, while others warned of the consequences of normalization, which they described as treachery. Although the UAE confirmed that the normalization agreement between the two sides was credited with stopping Israel's
... Show MoreThe aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreAn aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical
... Show More-convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties. Some examples to illustrate the aforementioned concepts and to cl
... Show MoreIn this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.