Background: Incorporation of chemical additives has long been a technique used to improve properties of the gypsum products. The purpose of this work was to study the effects of adding a combination of gum Arabic and calcium hydroxide to a type III dental stone and type IV improved die stone with different proportion. The effect on water/powder ratio, and surface hardness was determined. Material and method: Both material stone and die stone were blended with two proportion of additives so that each material was mixed twice but with different proportion of gum Arabic (0.1% and 0.2%) and calcium hydroxide (0.5 % and 0.3%). Data for hardness were subjected to two-way analysis of variance. Results: The results revealed that the chemical additives were reduced the water requirements of gypsum products so that the reduction of water lead to increase the density of mixture that sets harder. For type III dental stone the additives significantly improved the surface hardness, while for type IV improved die stone the surface hardness was not enhanced except it was designed to be mixed at low water/powder ratio, and in some instances a reduction in hardness was observed, especially at the most reduced water / powder ratio (0.18).
Introduction: The study was intended for Roseomonas gilardii NTCC 13290 strain pigment extraction and characterization. Methodology: The pigment-producing bacterial were cultured on Columbia blood agar and nutrient media agar. Then the pigments were extracted by ethanol. The candidate pigment was further characterized by different biotechnological techniques: UV-Vis spectroscopy, FT-IR to analyze the functional group of the targeted pigment, and TLC media. Results: The cultivation of Roseomonas gilardii on media showed pink color and nearly runny texture. The bacterial colonies were microscopically gram stained and examined, the R. gilardii was seen as coccobacillus colonies that mostly form pairs arranged as short chains. The R. gilardii b
... Show MoreIn the South of yement, when the accupation of Aden in 1839 by the British, British politics has proceeded in accordance with interests in promoting the existence and exploitation of this important site to implement their interests. Historians believe that Britain played a major role in the conflicts that have taken place on the land of Yemen, through a series of military and political dealings between them and the Ottoman Empire prior to withdrawal of Yemen and between local authorities and power to Yemen, such interactions have led to very serious consequences for the future of Yemen and Yemen was often divided into three parts, the northern areas under the authority of Imam Yahya, and the South, under the control of Britain, Asir and
... Show MoreA series of liquid crystals comprising a heterocyclics dihydro pyrrole and 1,2,3-triazole rings [VII]-[X] were synthesized by many steps starting from a reaction of 3,3'-dimethyl-[1,1'-biphenyl]- 4,4'-diamine with chloroacetyl chloride in a mixture of solutions DMF and TEA to synthesise the compounds [I], then the compounds [I] reacted with malononitrile in 1,4-dioxane and TEA solutions to produce compounds [II], then the first step is repeated with compound [II] where it reacted with chloroacetyl chloride in mixture of DMF and TEA to give compound [III], this compound reacted with sodium azide in the presence of sodium chloride and DMF as solvent to produce the compound [IV], which reacted with acrylic acid by a 1.3 dipolar reaction in sol
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreThe oil sector in Iraq suffered from several difficulties led to the decline and reduction of oil production and the deterioration of refineries and transport pipeline status in addition to the weakness of the technology side and the prevalence of financial and administrative corruption besides the high costs of rehabilitation of the oil sector and also administrative and institutional problems still ongoing.
In spite of Iraq's possession of vast oil wealth allows him to play an important role in the international energy market، he is still under the level. The production of oil doesn'<
... Show MoreHigh performance work systems and general industrial enterprise performance
The theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreAbstract:
The achievement of agricultural development provide food security and to form a basis for economic growth and comprehensive social, requires a number of actions to overcome the obstacles and problems facing the development of this economic sector, to make it able to achieve food security and operation of the workforce, and reduce dependence on the outside in the provision of food peripherals, and so it is only available through the highest degree of efficiency and economic mobilization of resources, so most of the developed and developing countries alike seek to achieve sustainable agricultural development tobacco meet the food requirements and good jobs for c
... Show More