Objective(s): This study aims to evaluate the hardness of two commercially available cold cured acrylic resin material
(Vertex and PAN) when polymerized at different temperature in comparison to those polymerized by conventional
methods in air at 23C ± 5C.
Methodology: Eighty specimens, forty from cold cured acrylic (Vertex Type) and forty from cold cured acrylic (PAN
type) were prepared, flasking and packing procedure were done according to manufacturer direction and divided
according to processing as follow: 20 specimens (10 from Vertex type and 10 from PAN type) were processed in air for
two hours at 23C ± 5C under press (bench curing) as a control, and 60 specimens (30 from Vertex type and 30 from
PAN type) were processed by ivomat curing device containing water under air pressure 30 Pascal for 15 minutes at
different temperature: 40C, 60C, and 80C (10 specimens for each groups). All specimens were tested for hardness test
by shore D device.
Results: Result showed that cold cured acrylic type PAN (polymerized by elevated temperature 80˚C) show the
maximum value of hardness (88.696) followed by cold cured acrylic type vertex polymerized at 60˚C (88.471). While,
control group type PAN (polymerized at air bench) recorded the minimum value of hardness (81.83). All groups that
polymerized at high temperature: 40C, 60C, and 80C show the higher value of hardness in comparison to those
processed by conventional methods (at air bench) with significant and highly significant differences.
Recommendations: Studies need to study the effect of increasing time and pressure of curing process on the hardness
of cold cure acrylic material, also to study the effect of increasing temperature of curing on the other properties of
cold cure acrylic material.
With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show Moreهدفت الدراسة الحالية الى التعرف ما اذا كان هناك تقبل اجتماعي للتلاميذ بطيئي من قبل اقرانهم العاديين؟ وكذلك معرفة ما اذا كان هناك فروق ذات دلالة في التقبل الاجتماعي بين افراد عينة الدراسة على وفق المتغيرات الاتية:
أ- العمر (9-13)
ب- الجنس (ذكور –اناث)
ج- المرحلة الدراسية
د- الحالة الاقتصادية (جيدة –متوسطة –جيدة جدا)
ولغرض تحقيق اه
... Show MoreAbstract
Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h
... Show MoreIn multivariate survival analysis, estimating the multivariate distribution functions and then measuring the association between survival times are of great interest. Copula functions, such as Archimedean Copulas, are commonly used to estimate the unknown bivariate distributions based on known marginal functions. In this paper the feasibility of using the idea of local dependence to identify the most efficient copula model, which is used to construct a bivariate Weibull distribution for bivariate Survival times, among some Archimedean copulas is explored. Furthermore, to evaluate the efficiency of the proposed procedure, a simulation study is implemented. It is shown that this approach is useful for practical situations and applicable fo
... Show MoreAbstract
The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search th
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreThis work studies the performance of zeolite permeable reactive barrier in removing cadmium from a contaminated shallow aquifer. Batch tests have been performed to characterize the equilibrium sorption properties of the zeolite in cadmium-containing aqueous solutions. A 1D numerical finite difference model has been developed to describe pollutant transport within groundwater taking pollutant sorption on the permeable reactive barrier (PRB), which is performed by Langmuir equation, into account. Numerical results show that the PRB starts to saturate after a period of time (~120 h) due to reduction of the retardation factor, indicating a decrease in the percentage of zeolite functionality. However, a reasonable agreement between model predict
... Show More