General medical fields and computer science usually conjugate together to produce impressive results in both fields using applications, programs and algorithms provided by Data mining field. The present research's title contains the term hygiene which may be described as the principle of maintaining cleanliness of the external body. Whilst the environmental hygienic hazards can present themselves in various media shapes e.g. air, water, soil…etc. The influence they can exert on our health is very complex and may be modulated by our genetic makeup, psychological factors and by our perceptions of the risks that they present. Our main concern in this research is not to improve general health, rather than to propose a data mining approach
... Show MoreGeotechnical engineers have always been concerned with the stabilization of slopes. For this purpose,
various methods such as retaining walls, piles, and geosynthetics may be used to increase the safety factor of slopes prone to failure. The application of stone columns may also be another potential alternative for slope stabilization. Such columns have normally been used for cohesive soil improvement. Most slope analysis and design is based on deterministic approach i.e a set of single valued design parameter are adopted and a set of single valued factor of safety (FOS) is determined. Usually the FOS is selected in view of the understanding and knowledge of the material parameters, the problem geometry, the method of analysis and the
The design of reinforced concrete spread foundations mainly depends on soil bearing capacity, loading value, and column size. So for each design case, tiresome calculations and time consumption are needed. In this paper, generalized design charts are presented and plotted according to derivations based on the ACI 318 M-2019 Code. These charts could be used directly by the structural designers to estimate the column size, foundation thickness, and dimensions as well as the foundation reinforcement under a certain given concentric load assuming a uniformly distributed contact pressure underneath the foundation. Of noteworthy, these charts are oriented to deal with square isolated footings with a square concentric column, covering reasonable r
... Show MoreBackground: Subcutaneous emphysema is a common presentation to the emergency department. The presence of emphysema in the head and neck region due to dental procedure is not common, and the presence of pneumomediastinum is exceedingly rare.
Case Report: A young lady, presented to the emergency department with chest pain, found to have pneumomediastinum following a dental procedure including a wisdom tooth extraction.
Conclusion: Complications following dental procedures are not uncommon, hence there should be a high index of suspicion for the emergency physicians for such patients, especially those where air turbine dental tools have been used.
Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
The main objective of the present work is to find a method increases the efficiency of the airfoil that is used for blade in wind turbine, wing in aircraft, propeller and helicopter (like NACA 4412). By overcoming the separation of flow at high angle of attacks, a slotted airfoil had been used and solved numerically through connecting the pressure side in the bottom surface with the suction side in the top surface of the airfoil to energize the separated flow. Slot exit, width and slope were considered as a parameters of slot configuration to determine the effective design of consideration. Reynolds number was taken as [1.6 x106 ] and the angle of attacks were ranged from (0o - 20o ). The numerical solution with Ansys Fluent commercial prog
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show More