With the development of modern mass media and the prevalence of use continues to both researchers and practitioners their efforts to understand how the media affect Hzha on both the individual and the institutions, society and culture as a whole, which means that the need to develop models and theories explain and predict the effects of the use of such means, therefore, the study of modern technologies of communication and information as an area of research has become mature to establish the intellectual base cohesive, but they are not mature enough, which calls for more research developments therefore become social networking sites online, (Facebook, and YouTube, and straining) known today as the new social media, which is witnessing the dynamics of development and deployment movement, it has been in its infancy virtual community on a small and limited scale, and then he grew with time to shift from information tool text written to the audio-visual media tool influence the decisions of those affected and their responses, under pressure from influential force used in the impact of personal styles of the individual (auditory, visual, and sensory ), that social networking sites have contributed to the activation of the principle of participation to achieve the desire of each category in the interests and activities itself, it also has a role in networking and advocacy and lobbying and interaction and influence with leaders of non-organization, and the achievement of social responsibility if properly invested and exploited and directed well, it has has been able to transform words and ideas and trends to ready work projects for implementation is social networking sites via the Internet ", from the latest communications technology products and the most popular, despite the fact that these sites were established in the foundation of social communication between individuals, their use extended to include political activity during the trading information political events, as well as the invitation to attend seminars or demonstrations.
To evaluate the bioactivity and the cytocompatibility of experimental Bioglass-reinforced polyethylene-based root-canal filling materials. The thermal properties of the experimental materials were also evaluated using differential scanning calorimetry, while their radiopacity was assessed using a grey-scale value (GSV) aluminium step wedge and a phosphor plate digital system. Bioglass 45S5 (BAG), polyethylene and Strontium oxide (SrO) were used to create tailored composite fibres. The filler distribution within the composites was assessed using SEM, while their bioactivity was evaluated through infrared spectroscopy (FTIR) after storage in simulated body fluid (SBF). The radiopacity of the composite fibres and their thermal properties were
... Show MoreMoisture damage is described as a reduction in stiffness and strength durability in asphalt mixtures due to moisture. This study investigated the influence of adding nano silica (NS) to the Asphalt on the moisture susceptibility of hot-mix-asphalt (HMA) mixtures under different aging conditions. NS was mixed with asphalt binder at concentrations of 2%, 4%, and 6% by weight of the binder. To detect the microstructure changes of modified Asphalt and estimate the dispersion of NS within the Asphalt, the field emission scanning electron microscope (FE-SEM) was used. To examine the performance of Asphalt mixed with NS at different aging stages (short-term and long-term aging), asphalt mixture tests such as Marshall stability,
... Show MoreObjective: Preparing training in a diverse style for young basketball players, and identifying the effect of training in a diverse style on some physical abilities (for young basketball players).Research methodology: the researchers chose the experimental method to know the research problem and its objectives, as it is represented by designing two equal groups, the control and the experimental, with pre- and post-tests. The study community was determined by youth basketball players for the 2023-2024 season, as the research community is (104) players, and a sample of (20) players was drawn from the youth category from Al-A'dhamiyah Sports Club, and it was chosen intentionally because they are the clubs most committed to training, as
... Show MoreBackground: Adipose derived-mesenchymal stem cells have been used as an alternative to bone marrow cells in this study. Objective: We investigated the in vitro isolation, identification, and differentiation of stem cells into neuron cells, in order to produce neuron cells via cell culture, which would be useful in nerve injury treatment. Method: Mouse adipose mesenchymal stem cells were dissected from the abdominal subcutaneous region. Neural differentiation was induced using β-mercaptoethanol. This study included two different neural stage markers, i.e. nestin and neurofilament light-chain, to detect immature and mature neurons, respectively. Results: The immunocytochemistry results showed that the use of β-mercaptoethanol resulted in
... Show MoreHigh-volume traffic with ultra-heavy axle loads combined with extremely hot weather conditions increases the propagation of rutting in flexible pavement road networks. Several studies suggested using nanomaterials in asphalt modification to delay the deterioration of asphalt pavement. The current work aims to improve the resistance of hot mix asphalt (HMA) to rutting by incorporating Nano Silica (NS) in specific concentrations. NS was blended into asphalt mixtures in concentrations of 2, 4, and 6% by weight of the binder. The behavior of asphalt mixtures subjected to aging was investigated at different stages (short-term and long-term aging). The performance characteristics of the asphalt mixtures were evaluated using the Marshall s
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More