Although the number of implants has increased gradually and consistently over the years to around one million per year globally, there is still far more potential for advancement in the field of dental implantology which is typically growing quickly. This study investigates the effect of nanofiller reinforcement high-performance polymer matrix to enhance mechanical and physical characteristics. Calcium silicate (CS)/Polyetherketoneketone (PEKK) biomedical composite (G0 as a control group) is reinforced with different weight percentages (G1-G4) of tellurium dioxide nanoparticles (TeO2NPs) ( n = 5). This research uses ethanol as a binder for mixing various weight percentages (wt%) of TeO2NPs with CS/PEKK biomedical composite. The combination is then dried at 120°C in a forced convection oven before being put into special molds and compressed for 20 min Holding period at 310°C and 15 MPa. The composites were prepared via the compression molding technique. Morphological, mechanical, and physical characteristics were studied. The findings of this study suggested improvement in the interfacial interaction between TeO2NPs (G1 and G2) and CS/PEKK bioactive composite resulting in better mechanical and physical properties, especially at 1 w% of TeO2NPs (G2).
According to the current situation of peroxidase (POD), the relevant studies on this enzyme indicated its importance as a tool in clinical biochemistry and different industrial fields. Most of these studies used the fruits and vegetables as source of this enzyme. So that in order to couple the growing requirements for POD with the recent demands for reduc-ing disposal volume by recycling the plant waste, the aim of the present study was to extract POD through management of municipal bio-waste of Iraqi maize species. A simple, green and economical method was used to extract this enzyme. Our results revealed that maize cobs are rich sources of POD, where the activity of this enzyme was found to be 7035.54 U/g of cobs. In pilot experiments thi
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreObstruct:  
... Show MoreAbstract:
Al-Hamraa palace considers one of the most important urban traces
that the Arab left behind in Andalus .Muhammed bin Al—Ahmer put its fist
stones then it was finished later by his thrown hirer .The poems of (ibn-
Zumrek)were graved on the palaces doors ,halls, and lion cages with all the
proud and dignity those poems contain.
This search identifies this palace first, then studies the contents of the
poems on Walls ,then the Urban features, and description of the palace sites
,buildings materials ,pillars ,decorations, and the geometrical
Vocabularies in the poems such as spaces , direction ,distance ,and
height.
Then the search describes the technical engineering of words
coordination, the
As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreIt is very well known in the planning publications that when creating spacing development to a region or sub-region, it can be able to make more than an alternative consisting with the strategic directions overtaken from the actual development of region and the situational and developmental objectives needed. However, the difficulty facing the situational planning is in selecting one of these alternatives to be the best in order to make a balanced situational re-structure, and achieving the economic, social and civil objectives. The developmental situation elements in the regions and governorates, including (Karbala) impose themselves as situational power which implies the process of re-structural arrangement where the situational develo
... Show MorePermeability estimation is a vital step in reservoir engineering due to its effect on reservoir's characterization, planning for perforations, and economic efficiency of the reservoirs. The core and well-logging data are the main sources of permeability measuring and calculating respectively. There are multiple methods to predict permeability such as classic, empirical, and geostatistical methods. In this research, two statistical approaches have been applied and compared for permeability prediction: Multiple Linear Regression and Random Forest, given the (M) reservoir interval in the (BH) Oil Field in the northern part of Iraq. The dataset was separated into two subsets: Training and Testing in order to cross-validate the accuracy
... Show More