The research in Islamic history is considered a title for the glory of the nation and a mirror for the intellectual and mental maturity of the men of the Islamic state who played an important role in saving humanity from darkness to light and from ignorance to knowledge and to show their position in building the Islamic state, and to highlight the importance of their conquests of neighboring cities and the expansion of Islam, and for this reason they appear The importance of writing on the topic (The Battle of Dumat al-Jandal and its impact on the era of the Prophethood and the Rightly Guided Caliphate). The reason for choosing this topic was to show the status of Dumat al-Jandal and its importance in the Islamic state and its great role in driving away the specter of the Byzantine enemy that was threatening the Islamic state at the time.
Background. The presence of black triangles around the dental implant-supported prosthesis and the failure to construct adequate papillae around them bothers dental implantologists. Peri-implant surgical soft tissue management will improve esthetics, function, and implant survival. Aim. To compare the effects of rolled and nonrolled U-shaped flaps combined with a temporary crown in enhancing the soft tissue around dental implants. Materials and Methods. Forty patients were included in this study; all patients were operated on by the same maxillofacial surgeon at Al-Iraq specialized dental clinics from January 2019 to January 2020. Patients were divided randomly into two groups: group A: at the second stage of implant surgery, a U-sh
... Show MoreThis study was conducted for evaluating the cytotoxic effect of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli on the proliferation of primary cancer cell cultures, obtained from tumor samples that were collected from (13) cancer patients and as follows: (five colon cancer patients, two bladder cancer patients, two breast cancer patients, two stomach cancer patients and two lung cancer patients), and on normal cell line (rat embryonic fibroblast / REF) (in vitro) with the use of different concentrations starting from (1) mg/ml and ending with (0.0002) mg/ml by making two fold serial dilutions by using the 96- well microtiter plate, and in comparison with negative (PBS) and positive (MMC, at concentration
... Show MoreThe research involves using phenol – formaldehyde (Novolak) resin as matrix for making composite material, while glass fiber type (E) was used as reinforcing materials. The specimen of the composite material is reinforced with (60%) ratio of glass fiber.
The impregnation method is used in test sample preparation, using molding by pressure presses.
All samples were exposure to (Co60) gamma rays of an average energy (2.5)Mev. The total doses were (208, 312 and 728) KGy.
The mechanical tests (bending, bending strength, shear force, impact strength and surface indentation) were performed on un irradiated and irrad
... Show MoreIn this paper deals with the effect laser irradiation on the optical properties of cobalt oxide (CoO2) thin films and that was prepared using semi computerized spray pyrolysis technique. The films deposited on glass substrate using such as an ideal value concentration of (0.02)M with a total volume of 100 ml. With substrate temperature was (350 C), spray rate (15 ml/min).The XRD diffraction given polycrystalline nature with Crystal system trigonal (hexagonal axes). The obtained films were irradiated by continuous green laser (532.8 nm) with power 140 mW for different time periods is 10 min,20min and 30min. The result was that the optical properties of cobalt oxide thin films affe
Modeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreThe present work aimed to make a comparative investigation between three different ionospheric models: IRI-2020, ASAPS and VOACAP. The purpose of the comparative study is to investigate the compatibility of predicting the Maximum Usable Frequency parameter (MUF) over mid-latitude region during the severe geomagnetic storm on 17 March 2015. Three stations distributed in the mid-latitudes were selected for study; these are (Athens (23.50o E, 38.00o N), Jeju (124.53o E, 33.6o N) and Pt. Arguello (239.50o W, 34.80o N). The daily MUF outcomes were calculated using the tested models for the three adopted sites, for a span of five-day (the day of the event and two days preceding and following the event day). The calculated datasets were co
... Show MoreThe plethora of the emerged radio frequency applications makes the frequency spectrum crowded by many applications and hence the ability to detect specific application’s frequency without distortion is a difficult task to achieve.
The goal is to achieve a method to mitigate the highest interferer power in the frequency spectrum in order to eliminate the distortion.
This paper presents the application of the proposed tunable 6th-order notch filter on Ultra-Wideband (UWB) Complementary Metal-Oxide-Semiconductor (CMOS) Low Noise
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show More