Background:In this study,TiO2 layer was thermally grown as a diffusion barrier on CP Ti substrate prior to electrophoretic deposition of HA coatings, to improve the coating’s compatibility also macro and micro pores in nano Hydroxyapatite dual coatings were created and their effect on the bond strength between the bone and implant was evaluated. Materials and methods: Electrophoretic Deposition technique (EPD) was used to obtain coatings for each one of four types of Hydroxyapatite(HA)on CP Ti screws (micro HA, nano HA, dual nano HA with micro pores, dual nano HA with macro pores) where carbon particles used as fugitive material to be removed by thermal treatment to create porosity.For examination of the changes occurred on the substrate, SEM, SPM and XRD used, coatings characterized by XRD, SEM and interfacial shear strength measurements. Results:The results mentioned the formation of rutilenano TiO2 with, SEM showed that the size of pores in HA coatings corresponded to the size of carbon particles. Statistical analysis of the removal torque tests showed highest means of the single nano HA coating at 2 and 4 weeks implantation intervals. Histological analysisrevealed a faster reaction of bone and higher osteoblasts activity towards thermally oxidized CP Ti implants coated with single nano HA coating. Conclusion:Carbon particles as a fugitive material within nano HA coat produced porosity.Presence of pores ˃ 1µ in nano HA coats did not achieve highest removal torque values nor highest osteoblasts activity in 2 and 4 weeks implantation intervals. Keywords:Titanium, Thermal oxidization, Nano Hydroxyapatite, Coatings, porosity.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThe concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
The direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreThe theater has live foundations that interact with all symbols and signs. It has never been far from these innovations and developments in the manner of dealing with those symbols and how and the extent of their effects on society through the world of technology because the theatrical performance contributes to its structure, a technique that is employed by designers in various technologies such as ( Music, lighting and sound effects engineer, as well as fashion designer, architecture, and modeling designer). The theater today also relied on various interactive techniques represented in the use of body language and a sign in order to communicate the meaning by forming movements, singing and dancing in order for the recipient to interact
... Show More