Background: The best material for dental implants is polyetherketoneketone (PEKK). However, this substance is neither osteoinductive nor osteoconductive, preventing direct bone apposition. Modifying the PEKK with bioactive elements like strontium hydroxyapatite is one method to overcome this (Sr-HA). Due to the technique's capacity to provide better control over the coating's properties, RF magnetron sputtering has been found to be a particularly useful technique for deposition. Materials and methods : With specific sputtering conditions, the RF magnetron technique was employed to provide a homogeneous and thin coating on Polyetherketoneketone substrates.. the coatings were characterized by Contact angle, adhesion test, X-ray diffraction (XRD), atomic force microscope and Elemental Analysis with Energy Dispersive X-Ray (EDX) Results : indicated that strontium hydroxyapatite had successfully deposited onto the surface with significant improvement in the wettability value to provide a suitable environment for cell attachment, spreading, proliferation, and differentiation Conclusion: Coating PEKK with RF magnetron sputtering can provide homogeneous surfaces laying the groundwork for improving PEKK's potential bioactivity, such as surface wettability. Wetting qualities are critical in implantable materials and are used to predict future osseointegration success.
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreThe aim of this paper is to present method for solving ordinary differential equations of eighth order with two point boundary conditions. We propose two-point osculatory interpolation to construct polynomial solution.
Background: Prophylaxis methods are used to mechanically remove plaque and stain from tooth surfaces; such methods give rise to loss of superficial structure and roughen the surface of composites as a result of their abrasive action. This study was done to assess the effect of three polishing systems on surface texture of new anterior composites after storage in artificial saliva. Materials and methods: A total of 40 Giomer and Tetric®N-Ceram composite discs of 12 mm internal diameter and 3mm height were prepared using a specially designed cylindrical mold and were stored in artificial saliva for one month and then samples were divided into four groups according to surface treatment: Group A (control group):10 specimens received no surfa
... Show MoreBackground: Large amounts of oily wastewater and its derivatives are discharged annually from several industries to the environment. Objective: The present study aims to investigate the ability to remove oil content and turbidity from real oily wastewater discharged from the wet oil's unit (West Qurna 1-Crude Oil Location/ Basra-Iraq) by using an innovated electrocoagulation reactor containing concentric aluminum tubes in a monopolar mode. Methods: The influences of the operational variables (current density (1.77-7.07 mA/cm2) and electrolysis time (10-40 min)) were studied using response surface methodology (RSM) and Minitab-17 statistical program. The agitation speed was taken as 200 rpm. Energy and electrodes consumption had been studi
... Show MoreIn this research TiO2 nano-powder was prepared by a spray pyrolysis technique and then adds to the TiO2 powder with particle size (0.523 μm) in ratio (0, 5, 10, 15 at %) atomic percentage, and then deposition of the mixture on the stainless steel 316 L substrate in order to use in medical and industrial applications.
Structure properties including x-ray diffraction (XRD) and scanning electron microscope (SEM0, also some of mechanical properties and the effect of thermal annealing in different temperature have been studied. The results show that the particle size of a prepared nano-powder was 50 up to 75 nm from SEM, and the crystal structure of the powders (original and nano powder) was rutile with tetragonal cell. An improvement in
This study was conducted on Lake Hamrin situated in Diyala governorate, focal Iraq, between latitudes 44º 53ʹ 26.16 '- 45º 07 ʹ 28.03ʺ and 34º 04ʹ 24.75ʺ ــ 34º 19ʹ 12.74ʺ . As in this study, the surface area of Hamrin Lake was calculated from satellite images during the period from October 2019 to September 2020, with an average satellite image for each month, furthermore,by utilizing the Normalized Differences Water Index (NDWI), the largest surface area was 264,617 km2 for October and the lowest surface area 140.202 km2 for September. The surface temperature of the lake water was also calculated from satellite images of the Landsat 8 satellite, based on ban
... Show MoreThe computer vision branch of the artificial intelligence field is concerned with developing algorithms for analyzing video image content. Extracting edge information, which is the essential process in most pictorial pattern recognition problems. A new method of edge detection technique has been introduces in this research, for detecting boundaries.
Selection of typical lossy techniques for encoding edge video images are also discussed in this research. The concentration is devoted to discuss the Block-Truncation coding technique and Discrete Cosine Transform (DCT) coding technique. In order to reduce the volume of pictorial data which one may need to store or transmit,
... Show MoreSpatial and frequency domain techniques have been adopted in this search. mean
value filter, median filter, gaussian filter. And adaptive technique consists of
duplicated two filters (median and gaussian) to enhance the noisy image. Different
block size of the filter as well as the sholding value have been tried to perform the
enhancement process.