The bauxite produced from Al-Ga 'ara area in Al-Enbar containing 50.4 wt. percentages Al2O3 was used for a- alumina production.
For α-alumina pro
... Show MoreCNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we
... Show MoreBuffering of Local anaesthesia (LA) has been suggested as a mechanism to improve injection comfort and hasten the onset of anaesthesia. Aim This study aimed to evaluate the effectiveness of buffered LA in the extraction of maxillary premolars and molars. Materials and Methods This randomized controlled study included 100 patients who were indicated for extraction of maxillary posterior teeth, they were randomly divided into two groups; a study group that received infiltration of buffered 2% lidocaine hydrochloride with 1:80,000 epinephrine LA, and a control group that received non-buffered 2% lidocaine hydrochloride with 1:80,000 epinephrine LA. The buffering was performed using the Onset® LA buffering system (Onpharma®). The outcome va
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreThe research aims to build a training program to develop the willpower in the kindergarten children. In order to achieve the objective of the research, the two researchers have developed a Training Program according to the following steps:
- Determining the general objective of the Training Program.
- Determining the behavioral objectives of the Training Program.
- Determining the content of the Training Program.
- Implementing the content of the Training Program sessions.
- Evaluating the Training Program.
The training program consisted of (15) sessions, each session included a set of parts (title, general objective, methods, time and place to implement the sessions, behavioral goals, tool
... Show MoreThe problem of the current research as the Iraqi Drilling Company suffers from the many challenges facing its work as a result of the current conditions in Iraq and the subsequent changes in the policies of the State Which left an impact on its activities and objectives, which created pressure on the importance of an organizational power capable of diagnosing the core competencies and development and maintain them to contribute to the raising and success in the performance of the company. The researchers adopted the method of analytical research and adopted the questionnaire as a main tool in the collection of research data and information . It was distributed to a community of (140) individuals from the low mana
... Show More