In this research we investigated the corrosion behavior of the commertialy pure titanium and Ti-6Al-4V alloy that coated with hydroxyapatite by electrochemical deposition with applied voltage (6,9,12) Volt from aqueous solution containing Ca(NO3)2.H2O =7.0 gm/l , (NH4)2HPO4 =3.5 gm/l , Na(NO3)2 = 8.5 gm/l in order to improve the bonding strength of hydroxyapetite and medical metals and alloys and increasing the biocompatibility. The coating layer morphology was investigated by XRD, Optical microscope , and SEM tests, the corrosio tests was made by use senthesys simulated body fluid (SBF) , and we found that the propreate voltage for coatint on Ti was 9 Volt and for Ti-6Al-4Vwas12Volt.
Waste is one of the most important problems affecting the city’s environment and its urban landscape, which results from the activities and activities of man and the natural environment. Its sources have varied between residential, commercial, industrial, medical and hazardous, and its spread in cities, on roads and on abandoned open lands, has led to significant negative effects and risks to human health and the environment.
Therefore, there were serious attempts to deal with waste and follow sequential steps that formed a waste management system such as (collection, sorting, transport, then treatment and disposal). Preventing and reducing waste, then recycling and recovering by composting or burning, and ending with bu
... Show MoreThe importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreMeans of communication has a great impact on all fields of awareness including health awareness by increasing the knowledge of community about health and developing their abilities to improve human health and cultural awareness. According to the importance of health awareness for a community to develop their intellectual and physical integrity, the researcher has found that it is essential to know the role of means of communication as a source of information for many students being active and main segments to build their society intellectually, socially and economically.
The research has focused on the study of health awareness among students and their health knowledge derived from the means of communicat
... Show MoreIn this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.
This research deals with the rhetoric purposes of the passive voice in the holy Quran. First, we put an introductory to the concept of the Quran language and its difference of the spoken Arabic language during the revelation period. Besides; we gave a brief about the structure passive voice form of Arabic language. Second, we explained the purposes of passive voice used in the holly Quran with sufficient examples, commentaries and clarifications about all the cases. Rhetoric purposes that we deals with are: concision, emphasize an idea, avoid using the subject because it is known and clear for all or because it is really unknown, etc. This part has contained the most important purposes for the use of passive voice in holy Quran. At the end
... Show Moren this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t
... Show More