We report on using a CO2 (10.6 µm) laser to debond the lithium disilicate veneers. Sixty-four sound human premolar teeth and 64 veneer specimens were used in the study. The zigzag movement via CO2 laser handpiece along with an air-cooled jet to prevent temperature elevation above the necrosis temperature limit (5.5 C°) was applied. The optimal deboning irradiation time was super-fast, at about 5 seconds at 3 Watt CO2 laser power. It is 20 times less than any previously published work for veneers debonding. The enamel beneath the debonded veneers has been assessed by atomic force microscopy (AFM) and shear stress technique as criteria for the easiness of debonding. The
... Show MoreThe evolution of thought, planning for Urban Communities in the second half of the twentieth century, through several successive stages. He was thought of planning urban communities depends on identifying the general plan for land uses of the project area as a basis for drawing charts the physical, social, economic, and put the general plan for land uses based on the terms of reference set by the number of experts in the ministries and agencies. I have lived cities in the Arab-Muslim region, during the transition period the natural and historic environment, urban, sophisticated balanced ways mentioned in the cultural, social, inspired by the teachings of Islam and the customs and traditions of the Arab social, put forth a set of
... Show MoreBackground: Alginate impression material is the irreversible hydrocolloid material that is widely used in dentistry. The contact time between alginate and gypsum cast could have a detrimental effect on the properties of the gypsum cast. The objective of this study is to evaluate the impact of various contact time intervals of Alginate impressions & type III dental stone on surface properties of stone cast. Materials and Methods: Time intervals tested were 1hour, 6 hours and 9 hours. Surface properties of stone cast evaluated were surface detail reproduction, hardness and roughness. Surface detail reproduction was determined using cylindrical brass test block in accordance with ISO 1563. Surface roughness was measured by profilometer
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
Audio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More