The focus of this paper is the presentation of a new type of mapping called projection Jungck zn- Suzuki generalized and also defining new algorithms of various types (one-step and two-step algorithms) (projection Jungck-normal N algorithm, projection Jungck-Picard algorithm, projection Jungck-Krasnoselskii algorithm, and projection Jungck-Thianwan algorithm). The convergence of these algorithms has been studied, and it was discovered that they all converge to a fixed point. Furthermore, using the previous three conditions for the lemma, we demonstrated that the difference between any two sequences is zero. These algorithms' stability was demonstrated using projection Jungck Suzuki generalized mapping. In contrast, the rate of convergence of these algorithms was demonstrated by contrasting the rates of convergence of the various algorithms, leading us to conclude that the projection Jungck-normal algorithm is the fastest of all the algorithms mentioned above.
ABSTRACT Background: According to Branemark’s protocol, the waiting period between tooth extraction and implant placement is 6–8 months; this is the late placement technique. Achieving and maintaining implant stability are prerequisites for a dental implant to be successful. Resonance Frequency Analysis (RFA) is a noninvasive diagnostic method that measures implant stability. The aim of this study was to investigate the influence of treatment protocol and implant dimensions on primary implant stability utilizing RFA. Materials and methods: This study included 63 Iraqi patients (37 male, 26 female; ranging 22-66 years). According to treatment protocol, the sample was divided into 2 groups; A (delayed) & B (immediate). Dental im
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThe research in the variables of the political process and government stability tried to show the impact of the political process on political stability first, and then on government stability second, given that the political process that was established in 2005 was aimed at achieving legitimacy, and its most prominent tools are elections, leading to achieving political stability, including government stability. The issue of governmental stability is one of the important issues in Iraq, but it has not been achieved, as a result of several factors, including problems in political action, as the political process has not succeeded in leading Iraq to stability.
In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
Background: Preparation of platelet-rich fibrin (PRF) is a simple, low cost and minimally invasive method to obtain a natural concentration of autologous growth factors that is widely used to accelerate soft and hard tissue healing, thus, PRF is used in different fields of medicine. The aim of this study was to evaluate the effect of local application PRF on stability of dental implants. Materials and methods: nineteen healthy patients with adequate alveolar bone with two or more adjacent missing teeth and/or bilaterally symmetric to the midline (split-mouth design) missing teeth participated in this study. Each patient received at least two dental implants (Dentium Co., Korea). After surgical preparation of the implant sockets, the PRF was
... Show MoreThe aim of this paper, is to discuss several high performance training algorithms fall into two main categories. The first category uses heuristic techniques, which were developed from an analysis of the performance of the standard gradient descent algorithm. The second category of fast algorithms uses standard numerical optimization techniques such as: quasi-Newton . Other aim is to solve the drawbacks related with these training algorithms and propose an efficient training algorithm for FFNN
In the present work, asphaltenes and resins separated from emulsion samples collected from two Iraqi oil wells, Nafut Kana (Nk) and Basrah were used to study the emulsion stability. The effect of oil resins to asphaltene (R/A) ratio, pH of the aqueous phase, addition of paraffinic solvent (n-heptane), aromatic solvent (toluene), and blend of both (heptol) in various proportions on the stability of emulsions had been investigated. The conditions of experiments were specified as an agitation speed of 1000 rpm for 30 minutes, heating at 50 °C, and water content of 30%. The results showed that as the R/A ratio increases, the emulsion will be unstable and the amount of water separated from emulsion increases. It was noticed that the em
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More<span>Dust is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. In the recent decade, climate change in Iraq, typified by increased droughts and deserts, has generated numerous environmental issues. This study forecasts dust in five central Iraqi districts using machine learning and five regression algorithm supervised learning system framework. It was assessed using an Iraqi meteorological organization and seismology (IMOS) dataset. Simulation results show that the gradient boosting regressor (GBR) has a mean square error of 8.345 and a total accuracy ratio of 91.65%. Moreover, the results show that the decision tree (DT), where the mean square error is 8.965, c
... Show MorePatients are very concerned about the lengthy nature of orthodontic treatment. It is necessary to find a non-invasive way to quicken physiologic tooth movement. This study's objective was to assess the effectiveness of low-intensity laser therapy in shortening the time and discomfort of orthodontic treatment. Experimental work: Using a split-mouth study to compare tooth movement with conventional treatment and laser-accelerated orthodontic tooth movement. A patient presenting with a class II division I malocclusion characterized by the misalignment of the upper and lower teeth as classified by Angle’s molar classification system was indicated to undergo fixed orthodontic appliance orthodontic treatment. The treatment plan involved bila
... Show More