Background: Significant advancements have been observed in the additive manufacturing (AM) technology industry in recent decades. Due to the inherent variations among each AM manufacturing technique, new areas of investigation continually arise and require consideration. Additionally, the novel applications of additive manufacturing present new difficulties and possibilities for targeted focus. The aim of this manuscript is to conduct a comprehensive literature review that describes the various processing methods, precision levels, types of materials utilized, and potential applications of 3D printing technology in the field of dentistry. Data: An online search was conducted on databases including Research Gate, Google Scholar, and
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show More
Debate is a teaching strategy in nursing education that enhances students' critical thinking. Although debate can be an effective teaching strategy, it is not without limitations. This article discusses the advantages and disadvantages of debate as a teaching strategy in nursing. Also, evaluating debates and choosing topics are highlighted.
Background: Neonatal seizures are the most common neurological emergency in newborns, often associated with significant mortality and long-term neurodevelopmental disabilities. The aim is to determine the incidence, etiological causes, and risk factors associated with neonatal seizures.Patients and Methods: This prospective case-control study was conducted over eight months, from January 1 to August 31, 2022, the study was conducted at the neonatal care unit of Children Welfare Teaching Hospital. Neonates who developed clinically recognizable seizures before 28 days of life in term infants, or up to 44 weeks corrected gestational age in preterm infants, were included. Data collection involved demographic information, prenatal, perin
... Show MoreVarious visual media are becoming an increasingly important and active instrument of communication. This fact has led some political parties and leading personalities in Iraq to make use of them as an accepted forum for the discussion of public affairs usually in a manner that conforms to their declared policy. They have to draw as much popular support as they could for the causes which they fight for. As a result, a state of great confusion has been created from the contradictory statements made by the contending parties and gave left grave consequences on all types of the audience receiving them. The problem of the study can be summarized in one major question: What is the opinions of the audience as regards the statements made by the
... Show MoreThis study aims to highlight the role of strategic leadership in adopting the intelligent organization model. The study was conducted on 7 economic organizations in Algeria. The study population consisted of 354 leaders, of whom a random sample of 176 leaders (managers, department heads, division heads, engineers) was selected. The researcher used a questionnaire as the main tool of the study. Statistical analysis and hypothesis testing were conducted using SEM (Structural Equation Modeling) with the aid of SPSS.v26 and AMOS.v24 software. The study concluded with a set of results, most notably: there is a statistically significant direct positive effect between strategic leadership and building intelligent organizations at a significance le
... Show MoreThe organizational integration forms a necessity according to McKinsey model, especially for service organizations. In the context of various service sector developments, importance adoption of compact mechanisms by these organizations to upgrade their services has increased and senior management must be more aware of environmental, competitive and developmental requirements. It gets more important when it shows in an organization seeking at excellence of making services within its policies and strategies. Subject organizational integration dimensions (strategy, structure, systems, style, staff, shared values, and skills) are effective components in directing behaviors of employees and organization. This motivated both researcher
... Show MoreThis research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the