Worldwide, enormous amounts of waste cause major environmental issues, including scrap tires and plastic, and large waste, a consequence of the demolition of buildings, including crushed concrete, crushed clay bricks, and crushed thermo-stone. From that point, it’s possible to consider that the recycling processes for these materials and using them in the manufacturing field will reduce the adverse effects on the environment of these wastes and the consumption of natural resources. Sustainable concrete blocks can be considered as one of the products produced by using these materials as partial volume replacement of the coarse, fine aggregate, or cement content, considering their dry density, workability, absorption, co
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreAlongside the development of high-speed rail, rail flaw detection is of great importance to ensure railway safety, especially for improving the speed and load of the train. Several conventional inspection methods such as visual, acoustic, and electromagnetic inspection have been introduced in the past. However, these methods have several challenges in terms of detection speed and accuracy. Combined inspection methods have emerged as a promising approach to overcome these limitations. Nondestructive testing (NDT) techniques in conjunction with artificial intelligence approaches have tremendous potential and viability because it is highly possible to improve the detection accuracy which has been proven in various conventional nondestr
... Show MoreBackground: The Andrews’ six keys of normal occlusion contribute individually and collectively to the total scheme of occlusion and, therefore, are viewed as essential to successful orthodontic treatment. The present research aims to evaluate the presence of the parameters of the Andrews’ Six Keys of normal occlusion in a sample of 100 Iraqi adults with complete permanent dentition and clinically acceptable normal occlusion (Angle’s Class I) in Baghdad city. Their age range 18-25 years (60 males and 40 females). Materials and methods: Each patient was subjected to clinical examination and then study cast models were made, with their occlusal records. The measuring tools that have been used involved: Three-dimensional goniometer to me
... Show MoreThe purpose of this research is to find the estimator of the average proportion of defectives based on attribute samples. That have been curtailed either with rejection of a lot finding the kth defective or with acceptance on finding the kth non defective.
The MLE (Maximum likelihood estimator) is derived. And also the ASN in Single Curtailed Sampling has been derived and we obtain a simplified Formula All the Notations needed are explained.
The tax is a financial amount collected from the taxpayer for the account of the public treasury.. and is the cornerstone of the close bond between members of the community and the country in which they live , as income tax is imposed on the profits and revenues achieved by people and often the constitution of most contemporary countries stipulate that the legislator is obligated to determine the sources of revenues and profits subjected to tax. Because the tax has a serious impact on people’s money because it is exposed to that money through direct deduction . Therefore, we note that the applicable income Tax Law stipulated that in order income to be subject to tax , it must be derived from one or more of the income sources st
... Show MoreIt was aimed to understand the interleukin-4 (IL-4) role in etio-pathogenesis of rheumatoid arthritis (RA). Two approaches were adopted. In the first one, a quantitative expression of IL4 gene was assessed by reverse transcription-quantitative polymerase chain reaction (RT-qPCR), and such findings were correlated with some demographic, clinical and laboratory parameters, which included gender, duration of disease, disease activity score (DAS-28), rheumatoid factors (RFs), C-reactive protein (CRP) and anti-cyclic citrullinated peptide (ACCP) antibodies. In the second approach, a single nucleotide polymorphism (SNP) of IL4 gene (rs2243250) was inspected by DNA sequencing using specific primers. Fifty-one Iraqi RA patients (22 males and 29 fem
... Show More