Background: Errors of horizontal condylar inclinations and Bennett angles had largely affected the articulation of teeth and the pathways of cusps. The aim of this study was to estimate and compare between the horizontal condylar (protrusive) angles and Bennett angles of full mouth rehabilitation patients using two different articulator systems. Materials and Methods: Protrusive angles and Bennett angles of 50 adult males and females Iraqi TMD-free full mouth rehabilitation patients were estimated by using two different articulator systems. Arbitrary hinge axis location followed by protrusive angles and Bennett angles, estimation was done by a semiadjustable articulator system. A fully adjustable articulator system was utilized to locate th
... Show MoreThe present study was conducted to evaluate the effect of variation of influent raw water turbidity, bed composition, and filtration rate on the performance of mono (sand) and dual media (sand and anthracite) rapid gravity filters in response to the effluent filtered water turbidity and headloss development. In order to evaluate each filter pe1formance, sieve analysis was made to characterize both media and to determine the effective size and uniformity coefficient. Effluent filtered water turbidity and the headloss development was recorded with time during each experiment.
In this article, the nonlinear problem of Jeffery-Hamel flow has been solved analytically and numerically by using reliable iterative and numerical methods. The approximate solutions obtained by using the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM). The obtained solutions are discussed numerically, in comparison with other numerical solutions obtained from the fourth order Runge-Kutta (RK4), Euler and previous analytic methods available in literature. In addition, the convergence of the proposed methods is given based on the Banach fixed point theorem. The results reveal that the presented methods are reliable, effective and applicable to solve other nonlinear problems.
... Show MoreThe research work represent a fast and simple method for the determination of methionine using chemiluminescence for the methionine-sodium hydroxide-luminol for the generation of a chemiluminesecent derivative of luminal. The emission was measured by continuous flow analysis made sample size of 83µL was used.Response versus concentration extended from 0.2-20 mM.L-1 with a percentage linearity of 96.17% or with 99.17% percentage of linearity for the range 0.6-20 mM.L-1. Reaching to a L.O.D. at (S/N=3) for 5 µM.L-1 from the gradual dilution for the minimum concentration in the calibration graph with a repeatability of less than 0.5% (n=10). A comparison was made between the new developed method with the classical method for the spectrophoto
... Show MoreThis research aims to measure the productivity of nursing services and recognize the reality of providing such services in some public hospitals in the province of Diyala, as well as identify the most important factors affecting the productivity of nursing services, and developer measure adopted by the researcher (Kien, 2012), which includes seven factors (workforce , management team, stimulation, pressure of working hours (time), material / equipment, supervision, safety), Used the experimental method in the search, one of the private scientific research curriculum depends primarily on the scientific experiment and study of the subject, or a scientific phenomenon, which provides an opportunity to learn the facts
... Show More
Style of Dostoevsky - it is a style that clearly emerges the desire for stimulating thought reader stage. It's a style calculated to provoke the reader to their findings, conclusions and reflections. Dostoevsky hints, expressed as like inaccurate and at the same time with some startling sophistication. It makes the readers think and draw their own conclusions.
Аннотация
Стиль Достоевского - этостиль, в которомясноотмечаетсястремлениек стимулированиюзаконченного мыслячитателя
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreOne of the most important problems that would continuously face the Higher education organizations is how to improve the service level presented by them, and how this can lead to increase demand for services of this organizations.As this issue has exhausted many organizations pushed some of them to withdraw from the market Because of weaknesses in their services. Here lies the importance of this matter to be given more attention in order to maintain the organization competitive position. According to that, The selection of the research title (The Impact of Quality on the Level of the University Service Request) which seeks to measure the impact of service quality on the level of demand, At a time when world&
... Show MoreThis research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show More