CO2 laser (10.6 μm) is the most often used laser in the oral surgery due to its high absorption by water of the oral tissues. Several benefits of the use of CO2 laser have been reported for oral surgical procedures. This study aims to evaluate the effect of CO2 laser on soft and hard oral tissues (in vitro study). This study was done on fresh tissues from sheep’s head. CO2Surgical Laser with different operation modes was used; 0.2 mm spot size using different laser parameters on the tongue, and bone making holes, incisions and cutting. The depths and widths of holes and incisions were measured using endodontic file under magnification. The speed of incisions was calculated and the required time for cutting was measured using sport clock. The depths of holes and incisions were increasing with increasing the power density and pulse duration from 90 μs to 1.7 ms in 100 μs increments and so in CW mode (for holes 2.5 mm at 15W, for incisions 6mm at 20W). Also the diameter of holes was increasing with power (1.2 mm at 15W) .The required time for cutting was decreasing as the power increased (14.14 sec. at 25W). The use of CO2 laser can be considered practical, effective and easy to carry out holes, incisions, and cuttings.
Polymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room
... Show MoreThe effect of annealing on the structural and optical properties of Antimony trisulfide (Sb2S3) is investigated. Sb2S3 powder is vaporized on clean glass substrates at room temperature under high vacuum pressure to form thin films. The structural research was done with the aid of X-ray diffraction (XRD) and atomic force microscopy (AFM). The amorphous to the polycrystalline transformation of these thin films was shown by X-ray diffraction analysis after thermal annealing. These films' morphology is explained. The absorption coefficient and optical energy gap of the investigated films are calculated using transmission spectra. Both samples have strong absorption in the visible spectrum, according to UV-visible absorption spectra. The optical
... Show MoreThe study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac
... Show MoreThe current study is an attempt to assess the cytogenotoxic potential of the ethanolic extract from the leaves of Borago officinalis on Swiss albino male mice. Young Swiss albino mice were orally administered with leaf ethanolic extract of Borago officinalis. Three mice groups were used using different doses of plant extract (T1: 100, T2: 200, and T3:400 mg\kg) in addition to the control negative group (untreated mice) for 7 days to assess mitotic index or 28 days to assess meiotic index. The results revealed that the extract significantly induced the division of disruptive chromosomal changes in the bone marrow and the mean of abnormality was (3.5±0.47, 4.43±0.83, and 5.83±0.96%) for T1, T2, and T3 re
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreChacha 20 is a stream cypher that is used as lightweight on many CPUs that do not have dedicated AES instructions. As stated by Google, that is the reason why they use it on many devices, such as mobile devices, for authentication in TLS protocol. This paper proposes an improvement of chaha20 stream cypher algorithm based on tent and Chebyshev functions (IChacha20). The main objectives of the proposed IChacha20 algorithm are increasing security layer, designing a robust structure of the IChacha20 to be enabled to resist various types of attacks, implementing the proposed algorithm for encryption of colour images, and transiting it in a secure manner. The test results proved that the MSE, PSNR, UQI and NCC metrics
... Show MoreIn this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show More