Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.
Background: Measuring implant stability is an important issue in predicting treatment success. Dental implant stability is usually measured through resonance frequency analysis (RFA). Osstell® RFA devices can be used with transducers (Smartpeg™) that correspond to the implants used as well as with transducers designed for application with Penguin® RFA devices (Multipeg™). Aims: This study aims to assess the reliability of a MultiPeg™ transducer with an Osstell® device in measuring dental implant stability. Materials and Methods: Sixteen healthy participants who required dental implant treatment were enrolled in this study. Implant stability was measured by using an Osstell® device with two transducers, namely, Smartpeg™ and M
... Show MoreThis study includes adding chemicals to gypseous soil to improve its collapse characteristics. The collapse behavior of gypseous soil brought from the north of Iraq (Salah El-Deen governorate) with a gypsum content of 59% was investigated using five types of additions (cement dust, powder sodium meta-silicate, powder activated carbon, sodium silicate solution, and granular activated carbon). The soil was mixed by weight with cement dust (10, 20, and 30%), powder sodium meta-silicate (6%), powder activated carbon (10%), sodium silicate solution (3, 6, and 9%), and granular activated carbon (5, 10, and 15%). The collapse potential is reduced by 86, 71, 43, 37, and 35% when 30% cement dust, 6% powder sodium meta-silicate, 10% powder activated
... Show MoreBackground: The elimination of the microorganisms from the root canal systems, an important step for the successful root canal treatment. This study was conducted to evaluate the antibacterial effectiveness of the photoactivated disinfection by using the toluidine blue O and a low- energy light emitting diode (LED) lamp . Materials and method: Sixty single rooted extracted teeth were decoronated, instrumented, irrigated, sealed at the apex and contaminated with endodontic anaerobic bacteria for 7 days to form biofilms in prepared root canals. Group I. Twelve teeth were medicated by photosensitizer (toluidine blue O) solution activated by diode lamp (FotoSan; CMS Dental, Copenhagen, Denmark).Group II. Twelve teeth were medicated by the tricr
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIt is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More