Background: The mechanical and physical properties of Polymethyl methacrylate (PMMA) don’tfulfill the entire ideal requirements of denture base materials. The purpose of this study was to produce new modified polymer nanocomposite (PMMA /ZrO2-TiO2) andassess itsimpact strength, transverse strength and thermal conductivity in comparison to the conventionalheat polymerized acrylic resin. Materials and Methods: Both ZrO2 and TiO2nano fillers were silanized with TMSPM (trimethoxysilyl propyl methacrylate) silane coupling agent before beingdispersed by ultrasonication with the methylmethacrylate (monomer) and mixed with the polymer by means of 2% by weight in (1:1) ratio, 60 specimens were constructed by conventional water bath processing technique and divided into 2 groups: 30 specimens for control group 0% nanofillers and 30 specimens for experimental group 2% of (1:1) ZrO2 and TiO2nano fillers then each group was subdivided into3 sub-groups according to the test to be conducted with 10 specimens for impact, transverse and thermal conductivity test. Results: The interaction of TMSPM silane and the nanofillers was confirmed by FT-IR (Fourier Transform Infra-red spectrophotometer). High significant increase in impact strength (9.838) Kj/m2 and transverse strength (101.705) N/mm2 and non-significant increase in thermal conductivity (0.286) W/m.C° of heat cured acrylic resin of the new polymer nanocomposite were observed. Conclusions: The addition of 2 wt.% of ZrO2:TiO2 by means of 1:1 ratio considerably improved the impact and transverse strength and had a positive effect on the thermal conductivity.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreDiamond-like carbon (DLC) homogeneous thin films were deposited from cyclohexane (Ccyclohexane (Ccyclohexane (Ccyclohexane (C cyclohexane (Ccyclohexane (Ccyclohexane (C cyclohexane (Ccyclohexane (C 6H12 ) liquid by using a plasma jet system which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with al
... Show MoreBacterial meningitis is a leading cause of illness and death worldwide. It is crucial for clinical and public health care, as well as disease control, to identify the meningitis-causing agent promptly. Between June 2021-February 2022, a total of 100 cerebrospinal fluid (CSF) and blood samples were collected from suspected cases of meningitis admitted to Raparin Paediatric Teaching Hospital, Erbil city-Iraq. Cytochemical, cultural, and biochemical tests were conducted, and confirmed by molecular techniques. Bacterial culture findings were positive in 7% of CSF samples and just one positive among blood samples. The most common pathogens found by cultural characteristics and VITEK 2 Compact System were Staphylococcus sciuri in two
... Show MoreBefore users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreAdverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD
... Show MoreIn this paper, we propose new types of non-convex functions called strongly --vex functions and semi strongly --vex functions. We study some properties of these proposed functions. As an application of these functions in optimization problems, we discuss some optimality properties of the generalized nonlinear optimization problem for which we use, as an objective function, strongly --vex function and semi strongly --vex function.
Nowadays, the use of natural bio-products in pharmaceuticals is gaining popularity as safe alternatives to chemicals and synthetic drugs. Algal products are offering a pure, healthy and sustainable choice for pharmaceutical applications. Algae are photosynthetic microorganisms that can survive in different environmental conditions. Algae have many outstanding properties that make them excellent candidate for use in therapeutics. Algae grow in fresh and marine waters and produce in their cells a wide range of biologically active chemical compounds. These bioactive compounds are offering a great source of highly economic bio-products. The prese
... Show More
Achieving energy-efficient Wireless Sensor Network (WSN) that monitors all targets at
all times is an essential challenge facing many large-scale surveillance applications.Singleobjective
set cover problem (SCP) is a well-known NP-hard optimization problem used to
set a minimum set of active sensors that efficiently cover all the targeted area. Realizing
that designing energy-efficient WSN and providing reliable coverage are in conflict with
each other, a multi-objective optimization tool is a strong choice for providing a set of
approximate Pareto optimal solutions (i.e., Pareto Front) that come up with tradeoff
between these two objectives. Thus, in the context of WSNs design problem, our main
contribution is to
The complexation between folic acid and a typical polyaromatic hydrocarbon, fluorene, was investigated using FTIR and UV spectra. Appearance of a new IR band at 2401cm−1 demonstrates that NH2–C=N moiety on pterin ring in folic acid is protonated when fluorene is introduced. The emergence of two charge transfer bands at 217 nm and 278 nm in UV difference spectra shows the presence of π-π complexation between folic acid and fluorene. These experiments confirm that fluorene could combine with the pterin ring of folic acid through π-π donor–acceptor interaction and induce the protonation process in folic acid upon strengthening electron accepting ability of pterin ring. The results suggest that complexatio
... Show More