The simulation of passively Q-switching is four non – linear first order differential equations. The optimization of passively Q-switching simulation was carried out using the constrained Rosenbrock technique. The maximization option in this technique was utilized to the fourth equation as an objective function; the parameters, γa, γc and β as were dealt with as decision variables. A FORTRAN program was written to determine the optimum values of the decision variables through the simulation of the four coupled equations, for ruby laser Q–switched by Dy +2: CaF2.For different Dy +2:CaF2 molecules number, the values of decision variables was predicted using our written program. The relaxation time of Dy +2: CaF2, used with ruby was calculated using the predicted value of γa.
Background: Ideal root canal obturation depends on many factors; one of them is good sealing of root canal without pores. The aim of this study was to determine the radiographic density of GuttaFlow® 2 with different obturation techniques using spiral computed tomography. Materials and Methods: Forty palatal roots of permanent maxillary first molar were used in this study. Following working length determination, root canal was prepared using rotary PROTAPER universal system. They were randomly divided into four groups of 10 roots each, the groups are Conventional lateral condensation with Apexit Plus sealer, Conventional lateral condensation with GuttaFlow® 2 as a sealer, Soft Core Regular with GuttaFlow® 2 as a sealer and singl
... Show MoreThe outbreak of a current public health coronavirus 2019 disease is a causative agent of a serious acute respiratory syndrome and even death. COVID-19 has exposed to multi-suggested pharmaceutical agents to control this global disease. Baricitinib, a well-known antirheumatic agent, was one of them. This article reviews the likely pros and cons of baricitinib in attenuation of COVID-19 based on the mechanism of drug action as well as its pharmacokinetics. The inhibitory effect of baricitinib on receptor mediated endocytosis promoter, AKK1, and on JAK-STAT signaling pathway is benefacial in inhibition of both viral assembling and inflammation. Also, its pharmacokinetic has encouraged the physicians toward the drug
... Show MoreThe purpose of this study was to evaluate the anesthetic effectiveness of a buccal infiltration technique combined with local massage (using 2% lidocaine) in the extraction of mandibular premolars to be utilized as an alternative to the conventional inferior alveolar nerve block.
Patients eligible included any subject with a clinical indication for tooth extraction of the mandibular 1st or 2nd premolars. All patients were anesthetized buccally by local infiltration technique followed by an external pressure applied for 1 min directly over the injection area. In each case, another local
The new tridentate Schiff base ligand (HL)namely 2-{[1-(3-amino-phenyl)-ethylidene]-hydrazono methyl}- phenol containing (N N O)as donors atoms was prepared in two steps:Step (1): By the reaction of 3- aminoacetophenone with hydrazine monohydrate under reflux in methanol and drops of glacial acetic acid gave the intermediate compound 3-(1- hydrazono ethyl)-phenol amine.Step (2): By the reaction of 3-(1-hydrazono ethyl)-phenol amine with salicyaldehyde under reflux in methanol, gave the ligand (HL).The prepared ligand was characterized by I.R, U.V-Vis,1H- 13C NMR spectra and melting point and reacted with some metal ions under reflux in methanol with (1:1) ratio gave complexes of the general formula: [MClL]. Where: M= Mn(II), Fe(II), Co(II),
... Show MoreRobot manipulator is a multi-input multi-output system with high complex nonlinear dynamics, requiring an advanced controller in order to track a specific trajectory. In this work, forward and inverse kinematics are presented based on Denavit Hartenberg notation to convert the end effector planned path from cartesian space to joint space and vice versa where a cubic spline interpolation is used for trajectory segments to ensure the continuity in velocity and acceleration. Also, the derived mathematical dynamic model is based on Eular Lagrange energy method to contain the effect of friction and disturbance torques beside the inertia and Coriolis effect. Two types of controller are applied ; the nonlinear computed torque control (CTC
... Show MoreIn this paper, the Magnetohydrodynamic (MHD) for Williamson fluid with varying temperature and concentration in an inclined channel with variable viscosity has been examined. The perturbation technique in terms of the Weissenberg number to obtain explicit forms for the velocity field has been used. All the solutions of physical parameters of the Darcy parameter , Reynolds number , Peclet number and Magnetic parameter are discussed under the different values as shown in plots.
In this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
In this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show More