Through the early childhood and after the ablactating the child learns acquired food habbits that might studying with him throughout his life. Here the parents role arises: teaching the child the sound food habits and hygienic styles and whatever beneficial to the health and with the sufficient quantities for the body. In this way the experiences the child learns at home will be of great help in his future life in choosing the suitable food after becoming more dependent in making his decisions and choices away from his parents. The results in this study showed that the averages of the children’s consumption of the high energy foods in comparison with the other highest consumption average , after that comes the con sumption of soft drills
... Show MoreA multistep synthesis was established for the preparation of a new vanillic acid-1, 2, 4-1triazole-3-thiol conjugate (
In this study new derivatives of Schiff bases 5-8, 1, 3-oxazepine 9-16 and tetrazoles 17-19 have been synthesized from the new starting material 1 which has synthesized the reaction of one mole of dichloro acetic acid and two moles of thiophenol, the esters 2-3 were synthesized from the reaction of compound 1 with methanol or ethanol respectively in the presence of H2SO4 as catalyst then 2, 2-dithiophenylaceto Hydrazide 4 were synthesized from the reaction of 2 or 3 with hydrazine hydrate 80%, Schiff bases 5-8 were synthesized from the reaction of 4 with appropriate aldehyde or ketone. Treatment of Schiff bases with maleic and phathalic anhydride in dry benzene to give 1, 3-oxazepen derivatives 9-16 and with sodium azide in tetrahydrofuran
... Show More<em>The aim of the research is to set a set of BioKinematic variables for the step of crossing barriers (3–6–9) in a 110-meter barrier for young runners. The researchers concluded the study by interpreting and discussing the results that the most important variables must be relied upon when training and selecting runners that got the best saturation on their factors: 1-The first factor which refers to the total distance of the plan to pass the third barrier + the total distance of the plan to pass the ninth barrier + the total distance Plan to cross the sixth barrier. 2-The second factor which refers to the total vertical speed before passing the third barrier + the total vertical speed before the sixth barrier + the total vertica
... Show MoreThis study assessed the effect of co-substitution of strontium (Sr) and magnesium (Mg) ions into the hydroxyapatite (HA) coating which was deposited on Ti–6Al–4V dental alloys by an electrochemical deposition process. The deposited layers were examined using energy-dispersive X-ray spectroscopy, scanning electron microscopy, Fourier transform infrared spectroscopy, atomic force microscopy and X-ray diffraction. The corrosion behavior of Ti–6Al–4V alloys in an artificial saliva environment was studied through potentiodynamic polarization technique and electrochemical impedance spectroscopy. The results indicated that the substituted Sr and Mg ions in HA improved the HA coating, where the protection efficiency percentage (PE%) for Ti
... Show MoreBackground: This in vitro study compares a novel calcium-phosphate etchant paste to conventional 37% phosphoric acid gel for bonding metal and ceramic brackets by evaluating the shear bond strength, remnant adhesive and enamel damage following water storage, acid challenge and fatigue loading. Material and Methods: Metal and ceramic brackets were bonded to 240 extracted human premolars using two enamel conditioning protocols: conventional 37% phosphoric acid (PA) gel (control), and an acidic calcium-phosphate (CaP) paste. The CaP paste was prepared from β-tricalcium phosphate and monocalcium phosphate monohydrate powders mixed with 37% phosphoric acid solution, and the resulting phase was confirmed using FTIR. The bonded premolars were exp
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreIn the present work, the fabrication techniques of type of Nd +3-glass laser active
media : namely, Neodymium- Tellurite glass, where the glass system(TeO2(1-x) - BaOZnO-
Nd2O3x) for values of (X=1,1.5,2,2.5,3,3.5 wt%) was used.
Measurements have been taken for the signal of fluorescence spectrum of Nd+3- glass
samples. The fluorescence spectrum, for one of the samples, has been taken, after the
sequences of polishing for the out surface.
The results give signal of fluorescence spectrum for the samples. Intensity of the peak of
the signal increases with Nd +3 concentration. The fluorescence at (l=1.06 mm) for one
of the samples has been detected and the fluorescence line width was (100 cm-1). The
cross section