Background: elastomeric impression materials are indicated when a high degree of accuracy is required, due to their excellent properties like details reproduction, dimensional stability and tear strength but with main two disadvantages those are their hydrophilicity as well as the absence of antibacterial activity. This study aimed to evaluate the effect of incorporation of 0.5% wt Ag-Zn zeolite into condensation silicone through the following tests; setting time, dimensional stability, reproduction of details, wettability, and hardness . Materials and methods: one hundred specimens were constructed of condensation silicone, divided into two groups for the first 50 specimens one0.5% by wt Ag -Zn zeolite was added, keeping the other fifty specimens without addition. Then each group further subdivided into five subgroups according to the conducted test. The tests performed were; setting time, dimensional stability, reproduction of details, hardness and wettability. Results: A statistically non-significant effect on the setting time and reproduction of details tests was observed, combined with a highly significant increase of wettability of condensation silicone after incorporation of 0.5% wt Ag-Zn zeolite with non-significant increase of dimensional change of condensation silicone following incorporation of 0.5% wt Ag-Zn zeolite. Hardness test results shoed statistically significant increase following the addition of Ag-Zn zeolite. Conclusion: Ag-Zn zeolite incorporated into condensation silicone, improved wettability which determine the extent to which an impression material replicates the structures of the oral cavity and production of bubble-free gypsum die. It also showed a statistically significant increase in the hardness of condensation silicone impression material, and had no effect on setting time, reproduction of details and dimensional stability.
In this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules. We also give some results and properties of this new kind of modules.
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreVol. 6, Issue 1 (2025)
The concept of tolerance is gaining its importance in the midst of an international society suffering from violence, wars and internal and international crises. It is practiced by extremist and extremist forces and movements acting in the name of religion to exclude the different Muslim and non-Muslim people according to the unethical practices and methodologies of Islamic law and reality. , Cultural, civilization .. that distinguish our world today. The society today is suffering from the ideas of the intellectual and aesthetic views of the different ideologically, ethnically, culturally and religiously in the world of the South. This is what the end-of-history thesis of Fukuyama and the clash of civilizations represented to Huntington.
... Show MoreFor the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.