The dynamics of a single condensing two-phase bubble of two different dispersed-continuous systems were studied. The systems were, CCl4 - water and CCl4 - 100% glycerol. Cinephotography was used to determine the change in height, diameter and time. These results were used to determine the experimental rise velocity of the bubble, which was compared with a theoretical one based on some equations used. It was found that the velocity of the first system remained almost constant, while it decreased gradually for the second system.
Background: The bond strength of root canal sealers to dentin and gutta-percha seems to be an important property for maintaining the stability of root canal filling, which potentially influences both leakage and root strength. The objective of this, in vitro, study was to evaluate the shear bond strength of three different endodontic sealers (Gutta-Flow, AH Plus, Apexit Plus) to dentin, in the presence and absence of the smear layer and gutta percha. Material and Methods: After slicing off the occlusal 2mm of 60 extracted human maxillary premolar teeth, the exposed dentin served as the tested surfaces; the teeth were fixed with cold cure acrylic, and were divided into two groups according to the smear layer presence, group A without smear
... Show MoreBackground: The most widely used material for fabrication of denture base is poly methyl methacrylate, despite its popularity, the main problems associated with it as a denture base material are poor strength particularly under fatigue failure inside the patient mouth, impact failure outside the patient mouth, which are the main causes for fracture of denture, several studies was done to increase mechanical properties of denture base. The present study was conducted to evaluate and compare the effect of addition single walled carbon nanotubes in different concentrations to polymethyl methacrylate on some mechanical properties (surface hardness, surface roughness, impact strength and transverse strength). Materials and methods: Forty eight
... Show MoreThermal management has become a major issue in the latest high performance computing machines because high CPU temperatures result in inefficient performance and decreased hardware life span. In this work, the cooling performance of a finned metal foam heat sink (FMFHS) was examined. The pore density values of tested copper metal foam (CMF) samples with different values of PPI 5, 10 and 20, with a constant porosity of 90%. For reference, these samples were measured by a conventional Aluminum plate-fin heat sink (CHS). The work was performed under experimental conditions in which air directed over the heat sink surface at air velocities (2.5, 3.0 and 3.5 m/s). The environmental temperature was fixed at 27 °C. Findings
... Show MoreThe present study discusses one of the most relevant and required topics in the recent period during globalization, the modern Russian system of terms for the oil and gas industry as a whole acquired a complete form in the second half of the twentieth century. The period of the late XX - early XXI centuries. marked by cardinal transformations in all areas of the political, economic, social and cultural life of Russia. These changes could not but affect industrial production. Transition to a new vector of development of the Russian economy based on the development of commercial trade, on the change and improvement of the development of industrial enterprises in the context of the implementation of national projects and the introduction
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.
This research aims to identify the impact of the reciprocal reading strategy on developing the innovative reading skills of fifth-grade secondary school students/ scientific branch. To achieve the goal of the research, an achievement test to measure the academic achievement of fifth-grade secondary school students in Arabic language grammar was prepared, a sample of (60) female students from the secondary school of Al- Bawaba Al-Sharkey for Girls in Baghdad were chosen for the academic year (2019-2020). For the purpose of applying the experiment, the test was applied on a pilot sample consisting of (30) students from the same research community. The researcher herself had taught the three
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More