Ziziphora persica Bunge is recorded as a new Study in Iraq. This species has been collected from Jabal Sinjar in Nineveh province in the north western part of Iraq. The morphological characters, habitat and geographical distribution of the species with a key to Ziziphora L. species in Iraq have been provided.
Background: The primary stability of the dental implant is a crucial factor determining the ability to initiate temporary implant-supported prosthesis and for subsequent successful osseointegration, especially in the maxillary non-molar sites. This study assessed the reliability of the insertion torque of dental implants by relating it to the implant stability quotient values measured by the Osstell device. Material and methods: This study included healthy, non-smoker patients with no history of diabetes or other metabolic, or debilitating diseases that may affect bone healing, having non-restorable fractured teeth and retained roots in the maxillary non-molar sites. Primary dental implant stability was evaluated using a torque ratc
... Show MoreRecently the use of nanofluids represents very important materials. They are used in different branches like medicine, engineering, power, heat transfer, etc. The stability of nanofluids is an important factor to improve the performance of nanofluids with good results. In this research two types of nanoparticles, TiO2 (titanium oxide) and γ-Al2O3 (gamma aluminum oxide) were used with base fluid water. Two-step method were used to prepare the nanofluids. One concentration 0.003 vol. %, the nanoparticles were examined. Scanning Electron Microscopy (SEM), Atomic Force Microscopy (AFM) and X-ray diffraction (XRD) were used to accomplish these tests. The stability of the two types of nanofluids is measured by
... Show MoreIn this paper, a Cholera epidemic model is proposed and studied analytically as well as numerically. It is assumed that the disease is transmitted by contact with Vibrio cholerae and infected person according to dose-response function. However, the saturated treatment function is used to describe the recovery process. Moreover, the vaccine against the disease is assumed to be utterly ineffective. The existence, uniqueness and boundedness of the solution of the proposed model are discussed. All possible equilibrium points and the basic reproduction number are determined. The local stability and persistence conditions are established. Lyapunov method and the second additive compound matrix are used to study the global stability of the system.
... Show MorePrecision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us
... Show MoreAbstract
The research aims to investigate the private sector attitudes toward operational contracting in special education schools. The research adopted the qualitative approach by using personal interviews with a sample of (45) private school owners and managers in Oman. The results of the research revealed that there is an agreement among the majority of respondents on the ability of the private sector to manage special education schools, the advantages of the partnership, as well as the need for guarantees to support this partnership. The government should fully assume it. The role of the private sector remains to raise the operational efficiency of schools. Opinions vary about the level of powers granted to t
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More