FG Mohammed, HM Al-Dabbas, Science International, 2018 - Cited by 2
Abstracts:
Background: The oral cavity is a complex environment, both structurally and functionally, the hard and soft tissues are in close a proximity. Oral tissues subjected to wear throughout the life, that threatened the vitality of the pulp or increase the sensitivity of dentinal tubules. One of the common dental problems is loss of enamel or cementum, which stimulate the nerve ending in or near the pulp and manifested as pain sensation. Aim of the study: This study had done to evaluate the effects of 980nm diode Laser in diameters reduction of exposed dentinal tubules analyze the results and morphological changes of irradiated dentine surface by FE-SEM (field emission scann
... Show MoreOne of most the important compounds which have active hydrogen (substrate) is the thiols which used in a wide field in preparation of Mannich bases . A large number of Mannich bases have been prepared as a biologically active compound (pharmaceutical, pesticides, bactericidal, fungicidal and tuberculostatic) and in order to correlate their structure and reactivity with their pharmacological activity such as . It has been reported that the reaction is easily proceeded by using primary and secondary amine beside formaldehyde. But when we tried the reaction of thiols as substrate and formaldehyde and succinimide instead of amine, the reaction did not proceed to give Mannich base but product were methylenene – bis – sulfide . Mann
... Show MoreThe digital camera which contain light unit inside it is useful with low illumination but not for high. For different intensity; the quality of the image will not stay good but it will have dark or low intensity so we can not change the contrast and the intensity in order to increase the losses information in the bright and the dark regions. . In this search we study the regular illumination on the images using the tungsten light by changing the intensities. The result appears that the tungsten light gives nearly far intensity for the three color bands(RGB) and the illuminated band(L).the result depend on the statistical properties which represented by the voltage ,power and intensities and the effect of this parameter on the digital
... Show MoreThe aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t
... Show MoreIn this study, a brand-new double transform known as the double INEM transform is introduced. Combined with the definition and essential features of the proposed double transform, new findings on partial derivatives, Heaviside function, are also presented. Additionally, we solve several symmetric applications to show how effective the provided transform is at resolving partial differential equation.
Market share is a major indication of business success. Understanding the impact of numerous economic factors on market share is critical to a company’s success. In this study, we examine the market shares of two manufacturers in a duopoly economy and present an optimal pricing approach for increasing a company’s market share. We create two numerical models based on ordinary differential equations to investigate market success. The first model takes into account quantity demand and investment in R&D, whereas the second model investigates a more realistic relationship between quantity demand and pricing.
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show More