Preferred Language
Articles
/
zBYS74oBVTCNdQwCtahN
Multiobjective Optimization of Stereolithography for Dental Bridge Based on a Simple Shape Model Using Taguchi and Response Surface Methods
...Show More Authors

Stereolithography (SLA) has become an essential photocuring 3D printing process for producing parts of complex shapes from photosensitive resin exposed to UV light. The selection of the best printing parameters for good accuracy and surface quality can be further complicated by the geometric complexity of the models. This work introduces multiobjective optimization of SLA printing of 3D dental bridges based on simple CAD objects. The effect of the best combination of a low-cost resin 3D printer’s machine parameter settings, namely normal exposure time, bottom exposure time and bottom layers for less dimensional deviation and surface roughness, was studied. A multiobjective optimization method was utilized, combining the Taguchi method with response surface methodology and the desirability function technique. The predicted optimal values for the cube’s dimensional deviation and surface roughness were 0.0517 mm and 2.8079 µm, respectively. The experiments’ validation of the findings confirmed the results, which were determined to be 0.0560 and 0.064667 mm and 2.770 and 2.6431 µm for the dimensional deviation and surface roughness for the cube and bridge, respectively. The percentages of prediction errors between the predicted optimum results and the printed response were 7.68% and 1.36% for dimensional deviation and surface roughness, respectively. This study demonstrates that the robust method used produced a dental bridge with good accuracy and a smooth surface.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Ocular Pharmacology And Therapeutics
Formulation and<i>In Vitro</i>Evaluation of Cyclosporine-A Inserts Prepared Using Hydroxypropyl Methylcellulose for Treating Dry Eye Disease
...Show More Authors

View Publication
Scopus (20)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Numerical Study of Compressible and Weak Compressible Flows in Channel Based on Artificial Compressibility Method and Fully Artificial Compressibility Method
...Show More Authors

      In this article, a numerical study of compressible and weak compressible Newtonian flows is achieved for a time marching, Galerkin algorithm. A comparison between two numerical techniques for such flows, namely the artificial compressibility method (AC–method) and the fully artificial compressibility method (FAC–method) is performed. In the first artificial compressibility parameter (  is added to the continuity equation, while this parameter is added to both continuity and momentum equations in the second technique. This strategy is implemented to treat the governing equations of Newtonian flow in cylindrical coordinates (axisymmetric). Particularly, this study concerns with the effect of the artificial compressibility p

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Educational And Psychological Researches
An Instructional Design According to the constructivism Model for Chemistry Subject and Its Effect on the Life Skill by the Second Intermediate Female Students
...Show More Authors

The research aims to identify the effect of teaching-learning design based on the constructivism theory on the life skills of middle stage students. The sample consisted of (60) students from one of the middle schools in Baghdad's governorate. The experimental group and control group consisted of 30 students for each group, the research tool was the life skills scale composed of (78) items. The scale proved its validity and reliability, which was found to be (0.85). The results showed a statistically significant difference in life skills between the two groups of research in favor of the experimental group, which studied the educational design according to models of constructivism theory compared to the usual method of teaching.

View Publication Preview PDF
Publication Date
Thu Mar 31 2022
Journal Name
Iraqi Geological Journal
Geological Model of the Khabour Reservoir for Studying the Gas Condensate Blockage Effect on Gas Production, Akkas Gas Field, Western Iraq
...Show More Authors

The Khabour reservoir, Ordovician, Lower Paleozoic, Akkas gas field which is considered one of the main sandstone reservoirs in the west of Iraq. Researchers face difficulties in recognizing sandstone reservoirs since they are virtually always tight and heterogeneous. This paper is associated with the geological modeling of a gas-bearing reservoir that containing condensate appears while production when bottom hole pressure declines below the dew point. By defining the lithology and evaluating the petrophysical parameters of this complicated reservoir, a geological model for the reservoir is being built by using CMG BUILDER software (GEM tool) to create a static model. The petrophysical properties of a reservoir were computed using

... Show More
Scopus (4)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cost technique based on ABCII specifications and its effect in the Implementation of contracting contracts: Applied research in Al-Mansour general company for construction contracting
...Show More Authors

The problem of research was to identify after the use of cost technology based on specifications in the validity of determining and measuring the costs of the implementation of contracting, by applying to al-Mansour General Construction Contracting Company as an appropriate alternative to the traditional costing system currently adopted, which is characterized by many shortcomings and weaknesses Which has been reflected in the validity and integrity of the calculations. To solve this problem, the research was based on the premise that: (The application of cost technology based on specifications will result in calculating the cost of the product according to the specification required by the customer, to meet his wishes properly and witho

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref