Background: Any child with Down's syndrome does not develop in the same manner as normal child. Therefore, the child should not be viewed as being like everyone else. Developmental enamel defects in primary teeth have been found at least twice as frequently in disabled children as in control children. Down's syndrome consumed protein more than the recommended daily allowance compared to other disabled groups. Therefore, the aim of this study was to investigate developmental defects of enamel and their relations to nutrient intake among Down's syndrome children in comparison to normal children. Materials and Methods: A sample consisted of fifty institutionalized Down's syndrome children (study group) and 50 normal children (control group)
... Show More
Summary of the jurisprudence research
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, our master Muhammad, and upon his pure family, and his ignorant and ignorant companions, and those who followed them in goodness until the Day of Judgment.
Then:
The many jurisprudential aspects that the Shafi’i imams said are of great importance, because these aspects are nothing but the opinions of venerable jurists who have reached a high degree of knowledge until they have become among the owners of faces. And among them are the Shafi’i jurists, the jurists may differ among themselves, either because there is no text about their imam in a
... Show MoreAbstract
This research aims to identify the effect of measuring reinforcement (regular - irregular) in gamification upon developing computer skills among secondary education students in the Kingdom of Saudi Arabia. The research experiment was applied on two samples of (68) secondary education students in the Kingdom of Saudi Arabia in the Aurar region. The results revealed there is a significant difference between the experimental group that used (irregular) reinforcement and the control group used (regular) reinforcement in gamification through the post-application of the electronic programming test and through the programming, language skills observing card (Visual Basic Studio).
The research aimed to identify “The impact of an instructional-learning design based on the brain- compatible model in systemic thinking among first intermediate grade female students in Mathematics”, in the day schools of the second Karkh Educational directorate.In order to achieve the research objective, the following null hypothesis was formulated:There is no statistically significant difference at the significance level (0.05) among the average scores of the experimental group students who will be taught by applying an (instructional- learning) design based to on the brain–compatible model and the average scores of the control group students who will be taught through the traditional method in the systemic thinking test.The resear
... Show MoreThe study aimed to identify the awareness degree of teacher students in the department of Arabic language and their supervisors at Al-aqsa University for their future roles in the age of knowledge. To achieve this objective, descriptive- analytical approach was used. The instruments of this study were two questionnaires: first one consist of (20) item for teacher students, and the second consist of (27) item for educational supervisors which covered three roles: professional, technological, and humanitarian. The sample was (120) student selected randomly, and (39) supervisors of Arabic language. The result revealed that the mean of degree awareness of teacher students and their supervisors of future role are (3.857), (3.472) respectively
... Show MoreThe aim of the research is to measure the change in the impact of the factors of the Corona pandemic on psychological sensitivity and COVID-19 phobia in a sample of Bisha University students and to detect the differences in the phobia (phobia) Covid-19 among the sample members in the measurement before the ban and after the ban was opened, in addition to the differences in psychological sensitivity of The sample has between sizes before and after the spread of the Corona pandemic, as well as the differences in them according to the gender variable (male, female). The researcher relied on the comparative approach. The scale of psychological sensitivity and COVID-19 phobia was applied to a sample of (62) male and female respondents.
... Show MoreIt is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.
This study aims to evaluate the influence of the air abrasion of dentin on the shear bond strength of lithium disilicate using three different types of luting cements. Sixty cylindrical specimens were milled from lithium disilicate CAD/CAM blocks (IPSe.max CAD). Sixty sound human maxillary premolar teeth were decoronated to the level of peripheral dentin, then randomly divided into three groups according to the type of luting cement used for the cementation of the lithium disilicate specimens (n = 20); Group A: Glass ionomer cement (Riva Self- Cure); Group B: Adhesive resin cement (Rely X Ultimate); Group C: Self-adhesive resin cement (Rely X U200). Each group was then further subdivided into two subgroups (n=10); Subgroups AI, BI, and CI,
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreSteganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show More