Background: Implant stability is a mandatory factor for dental implant (DI) osseointegration and long-term success. The aim of this study was to evaluate the effect of implant length, diameter, and recipient jaw on the pre- and post-functional loading stability. Materials and methods: This study included 17 healthy patients with an age range of 24-61 years. Twenty-two DI were inserted into healed extraction sockets to replace missing tooth/ teeth in premolar and molar regions in upper and lower jaws. Implant stability was measured for each implant and was recorded as implant stability quotient (ISQ) immediately (ISQ0), and at 8 (ISQ8) and 12 (ISQ12) weeks postoperatively, as well as post-functional loading (ISQPFL). The pattern of implant stability changes throughout the study period and its correlation with the recipient jaw and the DI dimensions were evaluated. Results: There was a significant difference in ISQ values throughout the study. DI stability in the maxilla was significantly higher than that in mandible for the ISQ0, with no significant effect for the rest time points. The effect of implant diameter was significant with DI of 4.1mm diameter being more stable. While for the length, there was no significant difference regarding its effect on ISQ values through-out the study period. Conclusions: DI inserted in the maxilla demonstrated better primary stability with no effect of recipient jaw on secondary stability and after functional loading, also DI with wider diameter had better stability throughout the study whereas DI length showed no significant effect on stability
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show More
Abstract
The net profit reported in the annual financial statements of the companies listed in the financial markets, is considered one of the Sources of information relied upon by users of accounting information in making their investment decisions. At the same time be relied upon in calculating the bonus (Incentives) granted to management, therefore the management of companies to manipulate those numbers in order to increase those bonuses associated to earnings, This practices are called earnings management practices. the manipulation in the figures of earnings by management will mislead the users of financial statements who depend on reported earnings in their deci
... Show MoreThe present work aimed to make a comparative investigation between three different ionospheric models: IRI-2020, ASAPS and VOACAP. The purpose of the comparative study is to investigate the compatibility of predicting the Maximum Usable Frequency parameter (MUF) over mid-latitude region during the severe geomagnetic storm on 17 March 2015. Three stations distributed in the mid-latitudes were selected for study; these are (Athens (23.50o E, 38.00o N), Jeju (124.53o E, 33.6o N) and Pt. Arguello (239.50o W, 34.80o N). The daily MUF outcomes were calculated using the tested models for the three adopted sites, for a span of five-day (the day of the event and two days preceding and following the event day). The calculated datasets were co
... Show MorePollutants generation is strongly dependant on the firing temperature and reaction rates of the gaseous reactants in the gas turbine combustion chamber. An experimental study is conducted on a two-shaft T200D micro-gas turbine engine in order to evaluate the impact of injecting ethanol directly into the compressor inlet air on the exhaust emissions. The study is carried out in constant speed and constant load engine tests. Generally, the results showed that when ethanol was added in a concentration of 20% by volume of fuel flow; NOx emission was reduced by the half, while CO and UHC emissions were almost doubled with respect to their levels when burning conventional LPG fuel alone.
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreIn this paper Alx Ga1-x As:H films have been prepared by using new deposition method based on combination of flash- thermal evaporation technique. The thickness of our samples was about 300nm. The Al concentration was altered within the 0 x 40.
The results of X- ray diffraction analysis (XRD) confirmed the amorphous structure of all AlXGa1-x As:H films with x 40 and annealing temperature (Ta)<200°C. the temperature dependence of the DC conductivity GDC with various Al content has been measured for AlXGa1-x As:H films.
We have found that the thermal activation energy Ea depends of Al content and Ta, thus the value of Ea were approximately equal to half the value of optical gap.
Absence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associa
Biomarkers such as Interleukin-6 (IL-6), Procalcitonin (PCT), C-reactive protein (CRP) and Neutrophil-Lymphocyte Ratio (NLR) have a role in the pathogenesis of severe coronavirus disease 2019 (COVID-19). The aim of this study was to explore the differences between serum levels of such biomarkers in severe and non-severe COVID-19 cases and compare them with normal people and to evaluate the sociodemographic variables and chronic diseases effect on the severity of COVID-19. The study included 160 subjects, divided into two groups, a case group of 80 patients, and a control group of 80 normal persons. The case group was divided into two subgroups: 40 severe COVID-19 patients and 40 patients with non-severe disease. Blood IL-6 was asses
... Show More