Glass Ionomer Cement (GIC) is one of the important dental temporary filing materials. The aim of this study is to evaluate the effect of adding 3, 5 and 7 wt. % of TiO2 microparticles to conventional GIC powder (Riva Self Cure) on mechanical properties and its effect on absorption and solubility processes. TiO2 particles additives improved compressive strength and biaxial flexural strength, where the compressive strength increased with increasing in the added ratio, while the highest value of the biaxial flexural strength was at 3 wt.%. The addition of TiO2 particles improved the surface Vickers microhardness values, with highest value at 5 wt. %. On other hand TiO2 addition improves the wear resistance as additives increased. The most acidic beverages (the lowest pH value) were the most effective in increasing the absorption and solubility percentage of samples. Orange juice was more effective followed by cola and then coffee and tea were less effective. Finally, its recommended that patients should reduce drinking these acidic beverages because its harmful effect on dental fillings.
The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
The purpose of this study is to evaluate the hydraulic performance and efficiency of using direction diverting blocks, DDBs, fixed on the surface on an Ogee spillway in reducing the acceleration and dissipating the energy of the incoming supercritical flow. Fifteen types of DDB models were made from wood with a triangulate shape and different sizes were used. Investigation tests on pressure distribution at the DDBs boundaries were curried out to insure there is no negative pressures is developed that cause cavitation. In these tests, thirty six test runs were accomplished by using six types of blocks with the same size but differ in apex angle. Results of these test showed no negative pressures developed at the boundarie
... Show MoreIndicative supervision represents the comparison between direct intervention (acquisition, nationalism) and participation through rules.
The last financial crisis reflected our needs for different approaches of supervision consist with our goals, but the crisis reveals also number of sounds requested and pressured toward direct control (Intervention via forces) through government acquisition and nationalization.
This study attempts to deal with crisis lessons, in the field of choice between indicative and direct supervision which government authorities used to reduce the bad effect on the monetary firms.
Iraqi banks suffered from high levels of direct co
... Show More
The research handles the prominent books of The Weak and Unknown Narrators , which is written by Imam Abu Al-Hasan Al-Daraqutni. It contains a brief introduction about the book and about Abu Bakr Al-Barqani, as well as Abi Mansour Ibn Hamkan.
The research handles the issue of unknown narrators and their relationship to the abandonment stipulated in the preamble to the book.
The research dealt with the identification and comparison between the sayings of Al-Daraqutni and his students - especially Al-Burqani, the publisher of his knowledge, as he is the one who narrated the sayings of Al-Daraqutni. The study concluded that the principle is to abandon the me
... Show MoreThe economic development and intense competition may make economic units neglected the social aspect as a service workers and the environment, the community and focus on the economic side and achieve profitability only, which puts it in a position of accountability of trade unions and bodies, environment, health, civil society organizations and the focus of many studies accounting in order to clarify social activities and disclosed in the financial statements, increasing pressure from multiple parties calling for governments to issue laws and regulations oblige economic units to disclose complete and accurate information in a timely manner for all social activities and be subj
... Show MoreThe effect of ethanol and methanol solvent, and their mixture has been studied on the absorption and fluorescence spectra of laser dye Rhodamine B at concentration of (10-4) Molar at room temperature. The molar absorption coefficient has been determined for mixture which was (3.223) at wave number (18181.8 cm-1), Also the Quantum Efficiency of the two solvents (ethanol and methanol) and their mixture have been calculated ,which was for mixture spectrum (38.94%) and it was larger comparing with other and solvents. The characteristics of spectrum has been determined by calculating (??) of absorption spectrum for the solvents and its mixture at maximum wave number ( ) cm-1 depending on solvent polarity and the transitions between molecular ene
... Show MoreAbstract\
The developed financial infrastructure is one of the most important elements for achieving stable financial system in a country. The importance of developed financial infrastructure comes from its role in create economic and financial context attractive for foreign investments. Thus, this paper aims first to measure an index of financial infrastructure, and secondly, to gauge the nexus between the developed financial infrastructure and foreign investments inflow in Malaysia and Indonesia. We estimate the index of financial infrastructure by using different indicators such as (the institutional environment, access to finance, legal environment, and others).
By using the G
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More