The message of our Prophet Muhammad (peace and blessings of Allaah be upon him) was the most complete of the messages, and the conclusion of the messages and completed by the mercy of this nation. Al-Khalal al-Baghdadi al-Hanbali (may Allaah have mercy on him) was a scholar who updated his writings. And The Nha Brhnha and became an independent and arranged doctrine Such a world of Galilee Hambali must show his character and his knowledge and its impact on the Islamic arena.
Background: Periodontal disease is a chronic bacterial infection that affects the gingiva and bone supporting the teeth. Smoking, which is an important risk factor for periodontitis, induce oxidative stress in the body and cause an imbalance between reactive oxygen species (ROS) and antioxidants, such as superoxide dismutase (SOD). This study aimed to evaluate the influence of smoking on periodontal health status by estimating the levels of salivary SOD level in non-smokers (controls) and light and heavy smokers and to test the correlation between the SOD enzyme level and the clinical periodontal parameters in each group. Materials and Methods: The study sample consisted of 75 male, with age ranged from 35 to 50 years. Clinically, the perio
... Show MoreElectro-kinetic remediation technology is one of the developing technologies that offer great promise for the cleanup of soils contaminated with heavy metals. A numerical model was formulated to simulate copper (Cu) transport under an electric field using one-dimensional diffusion-advection equations describing the contaminant transport driven by chemical and electrical gradients in soil during the electro-kinetic remediation as a function of time and space. This model included complex physicochemical factors affecting the transport phenomena, such as soil pH value, aqueous phase reaction, adsorption, and precipitation. One-dimensional finitedifference computer program successfully predicted meaningful values for soil pH profiles and Cu
... Show MoreThe present work involved four steps: First step include reaction of acrylamide ,N-?-Methylen-bis(acryl amide) and N-tert Butyl acryl amide with poly acryloyl chloride in the presence of triethyl amine (Et3N) as catalyst, the second step include homopolymerization of all products of the first step by using benzoyl peroxide(BPO) as initiator in (80-90)Co in the presence of Nitrogen gas(N2). In the third step the poly acrylimide which prepare in second step was convert into potassium salt by using alcoholic potassium hydroxide solution. Fourth step include Alkylation of the prepared polymeric salts in third step by react it with different alkyl halides(benzyl chloride, allylbromide , methyl iodide) by using DMF as solvent for(10-12) hours.
... Show MoreBackground: Visfatin is a novel adipokine that mainly secreted by visceral adipose tissue, had an important role in inflammation and immune system. Creatine Kinase (CK) which is an enzyme that is involved in energy metabolism, found in large amounts in myocardium, brain and skeletal tissues. This study is carried out To evaluate the periodontal health status of the study groups (chronic periodontitis and chronic periodontitis with coronary atherosclerosis) and control groups, to measure the salivary levels of visfatin and Creatine Kinase in these groups and compare between them, and to determine the correlations between salivary visfatin and Creatine Kinase levels with the periodontal parameters in the three groups. Materials and Methods: e
... Show MoreNumber of new polyester and polyamide are prepared as derivatives from 5,5`-(1,4-phenylene)-bis-(1,3,4-thiadiazole-2-amine) [C1], three series of heterocyclic compounds were synthesized.The first series includes the Schiff base [C2] prepared from the reaction between compound [C1] with p-hydroxy benzaldehyde in presence of acetic acid and absolute ethanol , then these derivatives have reaction with maleic anhydride , phthalic anhydride and sodium azide, respectively to obtain the compounds [C3-5] contaning (oxazepine and tetrazole) rings.The third series of compounds [C1-5] has transformed to their polymers [C6-15] by reaction with adipoyl chloride and glutroyl chloride , respectively. The reaction was followed by T.L.C and ident
... Show MoreThree mesoporous silica with different functional group were prepared by one-step synthesis based on the simultaneous hydrolysis and condensation of sodium silicate with organo - silane in the presence of template surfactant polydimethylsiloxane - polyethyleneoxide (PDMS - PEO). The prepared materials were characterized by Fourier transform infrared spectroscopy (FTIR), thermogravimetric analysis (TGA), atomic force microscopy (AFM) and nitrogen adsorption/desorption experiments. The results indicate that the preparation of methyl and phenyl functionalized silica were successful and the mass of methyl and phenyl groups bonded to the silica structure are 15, 38 mmol per gram silica. The average diameter of the silica particles are 103.51,
... Show MoreIn this research work a composite material was prepared contains a matrix which is unsaturated polyester resin (UPE) reinforced with carbon nanotube the percentage weight (0.1, 0.2, 0.4.0.5) %, and Zn particle the percentage weight (0.1, 0.2,0.4,0.5)%.
All sample were prepared by hand lay-up, process the mechanical tests contains hardness test, wear rate test, and the coefficient of thermal conductivity. The results showed a significant improvement in the properties of overlapping, Article containing carbon nano-tubes and maicroparticles of zinc because of its articles of this characteristics of high quality properties led to an, an increase in the coefficient of the rmalconductivity, and increase the hardness values with increased pe
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More