Background: Dental stone casts come into contact with impression materials and becomes susceptible to cross contamination from saliva and blood. This study was done to evaluate the physical and mechanical properties of dental stone type IV after treatments with various disinfecting agents and regimes (methods). Materials and Methods: Type IV dental stone and different types of disinfecting agents were used and divided into seven groups: G1: dental stone without disinfection (control group), G2: dental stone mixed with silver nitrate powder 0.5% , G3: dental stone mixed with silver nitrate powder 1%, G4: dental stone mixed with copper sulfate powder 0.5%, G5: dental stone mixed with copper sulfate powder 1% ,G6: dental stone immersed in propanol 70% and G7: dental stone immersed in ethanol 70%.Setting time, linear setting expansion, surface detail reproduction, compressive strength of type IV dental stone as well as compatibility with auto mixing addition silicone impression material were evaluated. The statistical analysis were conducted by ANOVA test followed by LSD test (p<0.05), also chi square test was used. Results: The compressive strength, linear setting expansion, surface detail reproduction and compatibility of stone specimens was affected to a higher extent by mixing with silver nitrate powder 1%, copper sulfate powder 1% while treating the stone specimens with the disinfecting powders at low concentrations as well as immersion of stone specimens in either ethanol or propanol for 15 minutes produce less effect on the previous tested properties. Conclusion: Silver nitrate 0.5%, copper sulfate 0.5% powders as well as 15 minutes immersion in 70% ethanol or 70% propanol did not promote adverse alterations in most of evaluated properties of type IV dental stone.
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreThe aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).
This paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys) of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreIn this article, the partially ordered relation is constructed in geodesic spaces by betweeness property, A monotone sequence is generated in the domain of monotone inward mapping, a monotone inward contraction mapping is a monotone Caristi inward mapping is proved, the general fixed points for such mapping is discussed and A mutlivalued version of these results is also introduced.
This article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f
... Show More