Background: The world is in front of two emerging problems being scarceness of virgin re-sources for bioactive materials and the gathering of waste production. Employment of the surplus waste in the mainstream production can resolve these problems. The current study aimed to prepare and characterize a natural composite CaO-SiO2 based bioactive material derived from naturally sustained raw materials. Then deposit this innovative novel bioactive coating composite materials overlying Yttria-stabilized tetragonal zirconia substrate. Mate-rials and method; Hen eggshell-derived calcium carbonate and rice husk-derived silica were extracted from natural resources to prepare the composite coating material. The manufac-tured powder was characterized via Fourier-transform infrared spectroscopy (FTIR), field emission scanning electron microscope (FESEM), X-ray fluorescence (XRF), X-ray diffraction (XRD) and particle size analyzer. The bioactive composite was deposited through radiofre-quency (Rf) reactive magnetron sputtering overlying disc-shaped samples with a dimension of 10 mm diameter were prepared from partially sintered Yttria-stabilized tetragonal zirconia polycrystal (Y-TZP). Results: The particle size of the rice husk-derived ranged between (480.4 – 606.1) nm with a mean particle diameter of 541 nm. The eggshell derived calcium carbonate powder presented a particle size between (266.4-336) nm and a mean particle diameter of 299.9 nm. The XRD data revealed the crystalline nature and phase composition of the natural prepared calcium carbonate powder and demonstrate the monocrystalline nature of natural SiO2. FTIR spectrometer showed the emergence of novel spectra separated from the two innovative components. XRF analysis revealed that 99.4% of the rice husk is SiO2 while eggshell-derived powder is mainly composed of calcium oxide. Fe-SEM images of the coated zirconia exhibited average thickness of the natural CaCO3/SiO2 coat layer may reach to12.84 µ. Conclusion: The prepared composite derived from natural resource waste is suitable to be utilized as a coating material for ceramic dental implants with promising biological and mechanical properties.
The current research aims to identify the types and rates and the reasons for the crimes that are with the origin and sexual scattered deviation between the fabric of Iraqi society, which reticent about because of the culture of the community, where he offered a researcher investigator justice and tribal leaders and lawyers about proportion and the types and causes of crime is the origin of sexual deviance and finally a question asked a researcher in 1000 young lived their adolescence days of the former regime (1979-2003) from going to brothels researcher found that 920 people and 92% had gone to the house to practice adultery and that 70 of them, and by 7% had engaged in masturbation only and that 10 of them have not committed anything
... Show MoreIn this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
The theory of Pilgrims in the Magra is based on Dekru's view that the mgha is considered a pilgrim, and that the pilgrims are pilgrims
Tujia purely exposes the abstract temptation structure, and that the discharge of the Mfezouz Mfarouz is through factors
This theory tends to highlight the role of pilgrim function as a language
There is no preservation unless directed towards a particular outcome. Gemma can include morphine blindness
Or formulas that allow for the presentation of a pilgrimage to a writer in addition to the content of the news, and the guidance of the recipient
In one direction or another.
The orbital masses are one of these morphines and functional components that achieve function
The Togolese
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.
Addressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreThis paper deals with constructing mixed probability distribution from mixing exponential
Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T
... Show MoreA random laser has been produced using Fluorescein dye solution in water, with concentration of (8 10-5 M); doped with (0.001g) TiO2 Nanoparticles with the particle size of (15.7 nm). A blue diode laser of 450 nm wavelength has been used as an optical pumping source. The wavelength of the random laser was 523 nm and the intensity was 5.44 mW