This study comes as: The responsibility of the Iraqi newspapers in promoting the political culture inside society, an analytical study in newspapers: Al-Sabah, Al-Ittihad, Al-Aalam for 2/ 3/ 2013 to 31/ 3/ 2013 to spot light on the extent to which the three mentioned newspapers are compliance with the promotion of the political culture inside society which is seen as one of the essential requirements for the success and promotion of the democratic process inside society.
The study aims to: finding out the extent to which these newspapers are compliance with their responsibility in the promoting the political culture inside society; knowing the nature of their role in pr
... Show MoreThe measurement data of the raw water quality of Tigris River were statistically analyzed to measure the salinity value in relation to the selected raw water quality parameters. The analyzed data were collected from five water treatment plants (WTPs) assembled alongside of the Tigris River in Baghdad: Al-Karkh, Al-Karama, Al-Qadisiya, Al-Dora, and Al-Wihda for the period from 2015 to 2021. The selected parameters are total dissolved solid (TDS), electrical conductivity (EC), pH and temperature. The main objective of this research is to predicate a mathematical model using SPSS software to calculate the value of salinity along the river, in addition, the effect of electrical conductivi
Background: The objective of this in vitro study was to evaluate the vertical marginal fit of crowns fabricated with ZrO2 CAD/CAM, before and after porcelain firing cycles and after glaze cycles. Materials and Methods: An acrylic resin model of a left maxillary first molar was prepared and duplicated to have Nickel-Chromium master die. Ten die stone dies were sent to the CAD/CAM (Amann Girrbach) for crowns fabrication. Marginal gaps along vertical planes were measured at four indentations at the (mid mesial, mid distal, mid buccal, mid palatal) before (Time 0) and after porcelain firing cycles (Time 1) and after glaze cycles (Time 2) using a light microscope at a magnification of ×100. One way ANOVA LSD tests were performed to determine wh
... Show MoreBackground: The study aim was to evaluate thermocycling effect on microleakage of occlusal and cervical margins of MOD cavity filled with bulk filled composites in comparison to incrementally placed nanohybrid composite and to evaluate the difference in microleakage between enamel and dentin margins for the three materials groups. Materials and method: Forty eight maxillary first premolars were prepared with MOD cavities. Samples were divided into three groups of sixteen teeth according to material used: Grandio: Grandio. SDR: SDR +Grandio. X-tra: X-tra base + Grandio. Each group was subdivided into two according to be thermocycled or not. After 24 hrs immersion in 2% methylene blue, samples weresectioned and microleakage was estimated. Res
... Show MoreBackground: Dental caries is one of the most significant problems in world health care. Restoring carious primary teeth is one of the major treatment goals for Children, and the light activated resin restoration materials like composite, resin-modified glass ionomer and polyacid-modified which was introduced in dentistry in 1970, widely used in clinical dentistry but its application increased dramatically in recent years because of its biocompatibility, color matching, good adhesive properties of its resemblance in physical and mechanical aspects to tooth. The aim of this study: To evaluate the microleakage of Polyacid-Modified Composite resin Compared to Flowable Hybrid Composite and Resin-Modified Glass ionomer cement. Materials and me
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show Morein this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More