Background: During acrylic resin processing, the mold must be separated from the surface of the gypsum to prevent liquid resin from penetrating into the gypsum, and water from the gypsum seeping into the acrylic resin. For many years, tin foil was the most acceptable separating medium, and because it's difficult to apply, a tin-foil substitute is used. In this study, olive oil is used as an alternative to tin foil separating medium for first time, and evaluating its effect as a separating medium on some mechanical properties such as (indentation hardness and transverse strength) of acrylic resins denture base comparing it with those processed using tin-foil and tin foil substitute such as (cold mold seal) separating medium. Materials and Methods: One hundred Twenty four acrylic resins samples (124) were prepared falling in two main groups: (heat and cold-cured acrylic denture base resins), for each group three types of separating medium were used and five tests (10 samples) for each test were carried out, and (4) samples for the chemical composition. Results: Tin foil is one of the most satisfactory separating media in getting the best properties when using it as a separating medium, while, a statistically no-significant difference have been noticed between olive oil and cold-mold seal samples concerning mechanical properties of tested groups. Infrared spectroscopy analysis showed that, no changes were found in the chemical composition of both heat and cold-cured acrylic resins denture base after using olive oil as a separating medium. Conclusion:The present study concluded that olive oil may be used as a substitute for tin foil and cold – mold seal separating medium in processing both heat and cold – cure acrylic resin denture base.
Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreRotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreThe fluctuations in oil prices in world markets affect the general budget and the trade balance of the rent countries, because oil is a strategic commodity affected by economic and political factors. The fluctuations in oil prices affect the public budgets of the rent countries through the public revenue side of oil revenues. On the other hand, these fluctuations affect the balance of trade through the volume of oil exports, which lead to imbalance of trade surplus or deficit . &nbs
... Show MoreObjective : To study the effect of some risk factors like age, smoking and Diabetes mellitus (DM) among patients with
certain cardiovascular diseases (Angina pectoris and Myocardial infarction), in addition to the assessment of the Creactive
protein (CRP) in the sera of those patients.
Methodology: The study was carried out on (100) subjects who were hospitalized in the Iraqi Center of heart Diseases
in Baghdad city and were suffering from Myocardial InfarcƟon (MI) (16) and Angina Pectoris (AP) (79) or from both (5)
over a period from September 2009 to June 2010. The results of paƟents were compared with those of (30) healthy
and age-matched individuals as a control group. Data were obtained from patients who were alr
