Aim: To evaluate the wettability and microhardness of Zirconium (ZrO2) dental material when coated with different concentrations of Faujasite. Materials and methods: 30 circular disks produced from ZrO2, then each group is classified into 10 control groups, 10 coated groups with 3% Faujasite, and 10 coated groups with 7% faujasite by electro-spun tool to study variable properties in hardness and water contact angle of implant materials. Results: This study stated the high hardness in 7% of faujasite concentration for ZrO2, in addition, the contact angle decreased gradually until reach 0 ᵒ in 7% concentration of faujasite with ZrO2 Conclusion: Water contact angle (WCA) declined till disappeared in (7% wt.) of faujasite coated with the ZrO2 group, also in the same group the microhardness became high compared with other groups due to alteration in surface morphology of substrate, and properties of coated material.
Facial trauma in children and adolescents is reported to range from 1% to 30%. Because of many anatomical, physiological, and psychological characteristics of the pediatric population, maxillofacial injuries in children should be treated with special consideration that is attributable to certain features inherent in facial growth patterns of children. This study evaluated maxillofacial injuries in 726 children in terms of incidence, patterns of injury, causes, and treatment modalities and compared these parameters among 3 pediatric age groups. Intergroup differences were analyzed using Z test for 2 populations' proportion. The results showed that the incidence of pediatric maxillofacial injuries and fractures is higher than that reported el
... Show MoreIn this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group ï£ (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of ï£ (A). 2.  an element e  A such that ï³(e) = – 1  ï³ ïƒŽ X. 3. Xïž :={a  A\ ï³(a) = 1  ï³ ïƒŽ X} = 1. 4. If f and g are forms over A and if x  D(
... Show MoreThe current research aims to identify the self-regulation of university students, as well as to identify the significance of the difference in self-regulation according to the variable of sex (male-female), specialization (scientific-human), and grade (first-fourth). To achieve the research objectives, the two researchers developed a scale of (28) items about self-regulation According to the theory of (Pandora, 1991). The scale was administered to (500) students from the first and fourth stages of Al -Mustansiriyah University who were selected based on the random stratification method for the 2020/2021 academic year. The results showed that university students have a good level of self-regulation. There are no significant differences in
... Show MoreThe research addressed the problem of widows that increased recently enormously. The researcher also referred to the perspective of Islam that gave a significant attention for both widows and orphans as powerless groups. Some straightforward example were presented to reflect the actual difficulties that encounter these groups as well as the author proposed number of appropriate ways that mitigate their psychological and physical sufferings such as: the provision of convenience jobs, and the legislation of rule that save their rights. Moreover, the researcher addressed the importance of marrying widows and what these challenges that encounter polygamy in Arab societies, the advantages and disadvantages of polygamy, and discussing all the
... Show MoreComputer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties,
Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application.
This study comes to shed light on the legal na
... Show MoreThe diagnoses system of varicose disease has a good level of performance due to the complexity and uniqueness in patterns of vein of the leg. In addition, the patterns of vein are internal of the body, and its features are hard to duplicate, this reason make this method not easy to fake, and thus make it contains of a good features for varicose disease diagnoses. The proposed system used more than one type of algorithms to produce diagnoses system of varicose disease with high accuracy, in addition, this multi-algorithm technique based on veins as a factor to recognize varicose infection. The obtained results indicate that the design of varicose diagnoses system by applying multi- algorithms (Naïve Bayes and Back-Propagation) produced n
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreA mathematical model and associated computer program were developed to simulate the steady state operation of wiped film evaporators for the concentration of glycerol-water solution. In this model, various assumptions were made to facilitate the mathematical model of the wiped film evaporator. The fundamental phenomena described were: sensible heating of the solution and vaporization of water. Physical property data were coded into the computer program, which performs the calculations of this model. Randomly selected experiments were carried out in a small scale wiped film evaporator from ALVAL COMPANY, using different concentrations of the glycerol solution (10, 30 and 50 Wt. %) for different feed rates (30, 50, 80, 100 and 120 l/h) and
... Show MoreThe Shari'a of Islam is the end of the laws revealed by God, including the goodness of the servants in the pension and the restored. They are supported by the enemies of Islam, especially in these days when the Islamic Ummah is subjected to a fierce campaign by its enemy to repel it from its religion through what they claim from the rights of women, including the right to equality with men.
Islam came to announce to all mankind that women are part of life in society without which they can not imagine life for them. Islam did not leave women under the absolute authority of men, but raised their status and worked to liberate them, and these rights are divorced from her husband, does she have the right