A group of acceptance sampling to testing the products was designed when the life time of an item follows a log-logistics distribution. The minimum number of groups (k) required for a given group size and acceptance number is determined when various values of Consumer’s Risk and test termination time are specified. All the results about these sampling plan and probability of acceptance were explained with tables.
Background: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva
... Show MoreThe theory of Topological Space Fiber is a new and essential branch of mathematics, less than three decades old, which is created in forced topologies. It was a very useful tool and played a central role in the theory of symmetry. Furthermore, interdependence is one of the main things considered in topology fiber theory. In this regard, we present the concept of topological spaces α associated with them and study the most important results.
Diabetic retinopathy is one of most important complications of diabetes mellitus that can be treated by Nd:YAG laser. Laser is used in ophthalmic practice for photocoagulation and photodisruption. The purpose of this study is to evaluate changes in immunological ,hematological and biochemical values after treatment of diabetic retinopathy by laser. Blood samples from 10 patients suffering from diabetic retinopathy were taken before and after laser treatment to coagulate retina to prevent leakage and hemorraghe to avoid deterioration of vision.In group one (4 patients = 40%), blood tests were done one day after treatment. In group two (6 patients =60%) tests were done 7 days after treatment with laser. The study showed no clear changes in
... Show Moreءأرﻘﻟا ةﺎﯾﺣﺑ ًﺎﻘﯾﺛو ًﻻﺎﺻﺗا لﺻﺗﺗ. نﻣ ﮫﺑﺗﺎﮐﻟﻟ ﻲﺻﺧﺷﻟا ﻊﺑﺎطﻟا ﻲﻔﺣﺻﻟا دوﻣﻌﻟا لﻣﺣﯾ ا فﻟﺗﺧﻣﻟ ﮫﻟوﺎﻧﺗ لﻼﺧ وا ﮫﺋارا وا هرظﻧ ﺔﮭﺟو لﻣﺣﺗ ﻲﺗﻟا ﺔﯾﻣوﯾﻟا ثادﺣﻻاو ﺎﯾﺎﺿﻘﻟ ﺢﺿﻔﺑ موﻘﯾو ثادﺣﻻاو ﺔﯾﺑﻟﺳﻟا رھاوظﻟﻟ ىدﺻﺗﯾ وا، ءيرﺎﻘﻟا ﯽﻟا ﮫﺑرﺎﺟﺗ وا هرﺎﮐﻓا ءﺎطﺧﻻا دﺻرﯾ بﯾﻗرﺑ ﮫﺑﺷا وھو، ءيرﺟﻟا دﻘﻧﻟا نﻋ مﻧﯾ بوﻟﺳﺎﺑ ﺔﺋطﺎﺧﻟا تﺎﺳرﺎﻣﻣﻟا ﺎﮭﺣدﻣﯾو تﺎﯾﺑﺎﺟﯾﻻا ﯽﻟﻋ
... Show MoreThe Berber tribes in the Islamic Maghreb and Andalusia had a distinct role in the future of states and entities .The Islamic Maghreb in terms of its stability,downfall,political relations and conflicts among them.Among these tribes was the Banu Yafran tribe, which is the subject of the study.
The Berber tribes in the Islamic Maghreb and Andalusia had a distinct role in the future of states and entities .The Islamic Maghreb in terms of its stability,downfall,political relations and conflicts among them.Among these tribes was the Banu Yafran tribe, which is the subject of the study.
فقد تناولت في موضوعي هذه الآية الكريمة فقد جاء في هذه الآية تعليم من الله عز وجل لرسوله (ص) فلكل داع الى الله من أمته, اسلوباٌ يدعوا به الناس ومحاجة الكافرين بالقرآن, وفيها بيان من الله عز وجل بأنه سيري الناس في المستقبل بعض آياته في كونه, وهي آيات دالات على أن القران حق منزل من عند الله جل جلاله, وليس من وضع البشر, فالناس عاجز عن معرفة الآيات الباهرات التي سيريها الله عز وجل للناس في كونه , وقد أخبرهم عنها في القرآ
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show Moreٳن العلاقة بين التخطيط والتنمية، تكتسب᾽ شكلها وطبيعتها من خلال دور التخطيط في ٳخضاع عملية التغيير والتحوّل للأوضاع الاقتصادية من وضع الى وضع آخر أكثر تقدما̋ عن طريق ٳعتماد منهج التخطيط لتحديد معالم خطوط السير المجدول زمنيا̋ لعملية التغيير والتحوّل وفقا̋ لرؤية الحكومة وفلسفتها باتجاه الانتقال من وضع ٳقتصادي وٳجتماعي متخلف الى وضع ٳقتصادي وٳجتماعي آخر يسمح بجعل عملية النمو مستمرة، ويمكن تبيّن تلك
... Show More