This study assessed the effect of co-substitution of strontium (Sr) and magnesium (Mg) ions into the hydroxyapatite (HA) coating which was deposited on Ti–6Al–4V dental alloys by an electrochemical deposition process. The deposited layers were examined using energy-dispersive X-ray spectroscopy, scanning electron microscopy, Fourier transform infrared spectroscopy, atomic force microscopy and X-ray diffraction. The corrosion behavior of Ti–6Al–4V alloys in an artificial saliva environment was studied through potentiodynamic polarization technique and electrochemical impedance spectroscopy. The results indicated that the substituted Sr and Mg ions in HA improved the HA coating, where the protection efficiency percentage (PE%) for Ti–6Al–4V alloys coated with Sr/Mg-HA was higher than for those coated with HA only. Maximum PE% was 74.19% for Ti–6Al–4V alloys coated with Sr/Mg-HA. Coating of the dental Ti–6Al–4V alloys with co-substituted bioactive Sr and Mg ions in HA improved the corrosion resistance properties of the alloys in the saliva environment.
Increased diseases and obesity currently due to increased production and excessive consumption of foods manufactured from non-food sweeteners without attention to the risk of consuming those additional high calories due to consuming these refreshing products such as juices and other various drinks, especially in the summer season by most segments of Iraqi society, especially workers, children and school students the aim of this study. Therefore, the study designed to replace sucrose with 0.03, 0.04 and 0.05% of each of the white stevia crystals and milled dry stevia leaves in the laboratory manufacture of juices and its effect on the general and sensory characteristics and the extent of their acceptability among the specialized r
... Show MoreThe subject of this research involves studying adsorption to remove hexavalent chromium Cr(VI) from aqueous solutions. Adsorption process on bentonite clay as adsorbent was used in the Cr(VI) concentration range (10-100) ppm at different temperatures (298, 303, 308 and 313)K, for different periods of time. The adsorption isotherms were obtained by obeying Langmuir and Freundlich adsorption isotherm with R2 (0.9921-0.9060) and (0.994-0.9998), respectively. The thermodynamic parameters were calculated by using the adsorption process at four different temperatures the values of ?H, ?G and ?S was [(+6.582 ? +6.547) kJ.mol-1, (-284.560 ? -343.070) kJ.mol-1 and (+0.977 ? +1.117) kJ.K-1.mol-1] respectively. This data indicates the spontaneous sorp
... Show MoreThe aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.
Mercury is a heavy metal that is extremely toxic. There are three types of it: inorganic, organic, and elemental. Mercury in all its forms has been shown to have harmful effects on living things. It can multiply its concentration from lower to higher trophic levels and accumulate in the body's various tissues. Aquatic organisms bodies have been exposed to mercury mostly through various human activities. The largest source of mercury pollution in the air is thermal power plants that mostly use coal as fuel. It is carried to a body of water after being deposited on the ground surface from the air. The way it enters the food chain is through aquatic plants and animals. Mercury accumulations in the kidney, liver, gills, or gonadal tissues of sp
... Show MoreMany urban and rural areas fall under the impact of disasters, whether natural or industrial, and with increasing complexity in urban areas, with diversity of economic, social and political components, and technological and cognitive development, the effects of disasters and wars have increased with the time, where disasters are affecting all aspects of life, causing great waste of property and lives, also displacement of populations and disruption of economic life, these effects are multiplied if they are not dealt with in sound curricula and scientific strategies.
The research aims to identify the experiences of some countries and their strategies and effective programs in reconstruction after exposure to disasters and wars wit
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More. The concepts of structural flexibility became one of the important goals in the design phases to reach high performance in architecture. The pioneering projects and ideas that linked architecture with technologies and scientific innovations appeared, with the aim of reaching projects that mix the concepts of flexibility with the development of machine thought and modern technology to meet the functional, environmental, and aesthetic requirements for human wellbeing. The aim of this paper is to identify the mechanisms used in order to reach flexible structural systems capable of accommodating technological changes and developments. The research hypothesizes that the structural design according to the concepts of flexibility achieves high s
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreIn this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.