Objectives To tailor composites of polyethylene–hydroxyapatite to function as a new intracanal post for the restoration of endodontically treated teeth (ETT). Methods Silanated hydroxyapatite (HA) and zirconium dioxide (ZrO2) filled low-density polyethylene (LDPE) composites were fabricated by a melt extrusion process and characterised using infrared spectroscopy (FTIR), differential scanning calorimetry (DSC) and dynamic mechanical analysis (DMA). The flexural strength and modulus were determined in dry state and post ageing in simulated body fluid and fractured surfaces analysed by SEM. The water uptake and radiographic appearance of the experimental composites were also measured and compared with a commercially known endodontic fibre
... Show More The current research aims at transforming the concept of implication from the rhetoric into the industrial design in order to have a new term (the design implication) in which the industrial designer takes all or part of another's design to imply his design in it and acknowledge that, and if he did not do so, it would be (design theft) parallel to the literary plagiarism.
In order to show the potentials of the industrial design in the production of new formulations of the industrial products forms, as the design is the carrier of language that addresses the recipients, it is possible to use the implication as a the tool of literature in the design and as a design strategy as it is one of the concepts that takes its course in e
Abstract
Travel Time estimation and reliability measurement is an important issues for improving operation efficiency and safety of traffic roads networks. The aim of this research is the estimation of total travel time and distribution analysis for three selected links in Palestine Arterial Street in Baghdad city. Buffer time index results in worse reliability conditions. Link (2) from Bab Al Mutham intersection to Al-Sakara intersection produced a buffer index of about 36% and 26 % for Link (1) Al-Mawall intersection to Bab Al- Mutham intersection and finally for link (3) which presented a 24% buffer index. These illustrated that the reliability get worst for link
... Show MoreThe indirect monetary policy tools led to financial stability for the period being studied through the use of indicators of financial stability (aggregate) to show the effect of the foreign reserves of the Central Bank of Iraq and its indirect instruments in achieving financial and economic stability, especially after the significant decline in oil prices and dependence of the Iraqi economy on Oil (rent) and lower reserves of the Central Bank of Iraq after 2014 and now compared to previous years, the goal of this research is to achieve financial stability according to selected indicators and achieve an optimal monetary policy to achieve the development goals of The economic policy in the country. Standard models were used to test
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show MoreThe aim of this work is to study the histological and histochemical structure of the Harderian gland in indigenous pigeons. Samples were obtained from 10 males and 10 females of adult healthy pigeons. Hematoxylin and eosin, Alcian blue (pH 2.5), periodic acid-Schiff and promo phenol blue, stains were used for paraffin section examination. The gland was teardrop like in shape, light brown to pink in color, capsulated with thin connective tissue. It was multilobular compound acinotubular in structure and lined by columnar epithelial cells. Lymphocyte, plasma cells and plasma cells with Russell bodies were present underneath the epithelia of central collecting duct and around the secretory unite. Histochemically; the
... Show Moreresearch objectives to:
1. identify the social, economic and cultural factors affecting consumption.
2. detect the consumption culture among the population in the city of Erbil.
3. Identify the GATT consumer protection and rights.
The most important results:
1. that there is variation in the answers of respondents about keep up with modernity in the basic consumption (necessary), it swallowed the proportion of yes answers about keep up with modernity in food consumption (72%), and is an indication of growing consumer awareness of the individual in the side of nutrition. The clothing on the side of the proportion of yes answers amounted to (85%), in the health field note that the percentage of yes answers (83%), who are abr
In recent years, the means of communication have achieved a great generality that made them occupy, in a short time, the first ranks among the most widely used social networks in the world, due to the many services and advantages offered by this network to its users. It has led to a leap in the field of visual communication, especially since it relies mainly on the image Its dimensions make it a means of communication and transfer of ideas and meanings between the peoples of the world, and it also allows the inclusion of digital advertising content using multimedia with a degree of professionalism in other social networks, which allowed the various segments of society the opportunity to invest this network in their businesses of differen
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More