Background: Marginal adaptation is critical for long – term success of crown and bridge restoration. Computer aided design / computer aided manufacture (CAD/ CAM) system is gaining more importance in the fabrication of dental restoration. Objective: The aim of this study is to evaluate the effect of crystallization firing on the vertical marginal gap of IPS. emax CAD crowns which fabricated with two different CAD/CAM systems .Materials and Methods: Twenty IPS e.max CAD crowns were fabricated. We had two major groups (A, B) (10 crowns for each group) according to the CAD/CAM system being used: Group A: fabricated with Imes - Icore CAD/CAM system; Group B: fabricated with In Lab Sirona CAD/CAM system. Each group was subdivided into two s
... Show MoreObjective(s): The aims of present study to findout the effect of aeromedical evacuation program on flight medics’ knowledge.
Methods: A pre-experimental design is carried in army aviation bases in Iraq, for the period of April 1st 2019 to October 25th 2019. Non-probability "purposive" sample of (30) flight medics are selected from army aviation bases. The questionnaire consisted of two main parts: the demographic characteristics of air paramedics, and the second part included five axes, which are (50) paragraphs related to the knowledge of air paramedics towards emergency injuries. The researcher used the statistical program version 20 to analyze the data, and the stability of the questionnaire was measured through the pre and post
The study aimed to analyze the effect of meteorological factors (rainfall rate and temperature) on the change in land use in the marshes of the Al‐Majar Al‐Kabir region in southern Iraq. Satellite images from Landsat 7 for 2012 and Landsat 8 for 2022 were used to monitor changes in the land coverings, the images taken from the Enhanced Thematic Mapper Plus (ETM+) and Operational Land Imager (OLI) sensors of the Landsat satellite. Geometric correction was used to convert images into a format with precise geographic coordinates using ArcMap 10.5. The maximum likelihood classification method was used to examine satellite image data using a supervised approach, and the data were analyzed statistically. We obtained clear images of the area,
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreThe support qualitative information regards as an additional step in the process of decision-making where the method following by companies to provide information help in the creation of value because it is very important to deliver information to investors about their stratigies and what happen truly inside the companies i.e. every case relating with the expectations of stockhotslder and the prices of markets depending on those expectation ,and if the matter isn’t that there will be lack of confidence thate couldn’t be backed again. The decisions of the investors effected by security ,economic ,political, psychological, emotional ,and financial factors .
... Show MoreThe social networking sites have brought about fundamental changes and a qualitative shift in the marketing industry and its strategies. The Iraqi ministries have used this site i.e. Facebook to spread and disseminate values in order to consolidate it in Iraqi society which has witnessed many changes in all aspects of life.
The researcher studies the pages of both ministries to know the values contained in the publications of the pages of these two ministries, the quality of grooming as well as the forms in which these values are marketed.
The researcher uses a survey method and content analysis for the publications of these two pages during the study period starting from January 1, 2
... Show MoreCurrent research aims to find out:
- Effect of using the active learning in the achievement of third grade intermediate students in mathematics.
- Effect of using of active learning in the tendency towards the study of mathematics for students of third grade intermediate.
In order to achieve the goals of the research, the researcher formulated the following two hypotheses null:
- There is no difference statistically significant at the level of significance (0.05) between two average of degrees to achievement
The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. The
... Show More