Background: Glass ionomers have good biocompatibility and the ability to adhere to both enamel and dentin. However, they have certain demerits, mainly low tensile and compressive strengths. Therefore, this study was done to assess consistency and compressive strength of glass ionomer reinforced by different amount of hydroxyapatite. Materials and Methods: In this study hydroxyapatite materials were added to glass ionomer cement at different ratios, 10%, 15%, 20%, 25% and 30% (by weight). The standard consistency test described in America dental association (ADA) specification No. 8 was used, so that all new base materials could be conveniently mixed and the results would be of comparable value and the compressive strength test described by British standard specification for zinc polycarboxylate cement was used in this study. Results: Different consistencies of materials produced a disc of varying sizes. The amount of the powder (in milligram) was mixed with 0.5 ml of liquid to produce a consistency giving a disc of 3 cm±1mm in diameter were 500 mg for glass monomer cement, 450 mg for glass ionomer cement reinforced by 10%, 5% and 30% of hydroxyapatite and 350 mg for glass ionomer cement reinforced by 20% and 25% of hydroxapatite. The results showed that the glass ionomer cement reinforced by hydroxyapatite has higher compressive strength than conventional glass ionomer. Conclusion: The addition of hydroxyapatite to conventional glass ionomer requires less powder to liquid ratio. Addition of hydroxyapatite to glass ionomer cement increased its compressive strength.
Objective: Preparing training in a diverse style for young basketball players, and identifying the effect of training in a diverse style on some physical abilities (for young basketball players).Research methodology: the researchers chose the experimental method to know the research problem and its objectives, as it is represented by designing two equal groups, the control and the experimental, with pre- and post-tests. The study community was determined by youth basketball players for the 2023-2024 season, as the research community is (104) players, and a sample of (20) players was drawn from the youth category from Al-A'dhamiyah Sports Club, and it was chosen intentionally because they are the clubs most committed to training, as
... Show MoreThis research aims to identify the reality of teaching political science research methods curriculum, to observe practices, and differences in teaching and learning between the Arab and Western universities. Moreover, it focuses on the difficulties that face students' acquisition of the course skills. The research uses the course model of some Western and Arab universities as case study.
This research shows that the curriculum do not reach yet the final form as other political science curriculums, and its upcoming changes will reflect the needs of stakeholders. The best method to teach this curriculum is to use applied learning in groups, learning by doing, and finally problem-based learning approach. Using optimal assessment deep
... Show MoreSince its first description as a cytotoxic agent, Olea europaea leaves extract gained significant popularity against human breast cancer, ethyl acetate extract of Olea europaea leaves obtained by acid hydrolysis method was evaluated in vitro as cytotoxic agent against new human breast cancer (AMJ13) cell line, using the MTT assay. One main pentacyclic triterpenoid; oleanolic acid, was isolated from leaves of Olea europaea by well-known two different methods, but not used for this compound before, the acidic hydrolysis method and basic acidic method. The presence of oleanolic acid was proved in both methods with qualitative and quantitative d
... Show MoreThe association of phytoplasma was investigated in symptomatic tomato (
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More