This study focuses on producing wood-plastic composites using unsaturated polyester resin reinforced with Pistacia vera shell particles and wood industry waste powder. Composites with reinforcement ratios of 0%, 20%, 30%, and 40% were prepared and tested for thermal conductivity, impact strength, hardness, and compressive strength. The results revealed that thermal conductivity increases with reinforcement, while maintaining good thermal insulation, reaching a peak value of 0.633453 W/m·K. Hardness decreased with increased reinforcement, reaching a minimum nominal hardness value of 0.9479. Meanwhile, impact strength and compressive strength improved, with peak values of 14.103 k/m² and 57.3864568 MPa, respectively. The main aim is to manufacture eco-friendly wood-plastic composites suitable for structural use, addressing environmental concerns by recycling wood waste. This research aims to contribute to sustainability by creating materials for decorative elements or secondary roofing, minimizing the environmental impact of wood waste, and promoting eco-friendly alternatives for daily use.
Pathogenic microorganisms are becoming more and more resistant to antimicrobial agents. So the synthesis of new antimicrobial agents is very important. In this work, new 5-fluoroisatin-chalcone conjugates 5(a–g) were synthesized based on previous research that showed the modifications of the isatin moiety led to the synthesis of many derivatives that have antimicrobial activity. 4-aminoacetophenone reacts with 5-fluoroisatin to form Schiff base (3), which in turn reacts with two different groups of aromatic (carbocyclic and heterocyclic) aldehydes 4(a–g) separately to form the final compounds 5(a–g). Proton-nuclear magnetic resonance (¹H-NMR) and Fourier-transform infrared (FT-IR) spectroscopy were used to confirm the chemic
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreAbstract:-
The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.
In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.
I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an
... Show MoreArum maculatum is traditionally used for the control of many diseases and illnesses such as kidney pain, liver injury, hemorrhoids. However, the detailed biomedical knowledge about this species is still lacking. This study reports on the bioactive components and the possible mechanisms underlying the antioxidant, anti-inflammatory and cytotoxic activity of A. maculatum leaf extract. Gas chromatography-mass spectrometry (GC-MS) was used for phytochemical analysis. Assay of 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide ) (MTT) was used to determine the cytotoxicity in the murine cell line L20B upon exposure to different extract concentrations for 24 h. Enzyme-linked immunosorbent assay (ELISA) was used to detect pro-in
... Show MoreIn this study, the response of ten composite post-tensioned concrete beams topped by a reinforced concrete deck with adequate reinforcing shear connectors is investigated. Depending on the concrete compressive strength of the deck slab (20, 30, and 40 MPa), beams are grouped into three categories. Seven of these beams are exposed to a fire attack of 700 and 800 °C temperature simultaneously with or without the presence of a uniformly distributed sustained static loading. After cooling back to ambient temperature, these composite beams are loaded up to failure, using a force control module, by monotonic static loading in a four-point-bending setup with two symmetrical concentrated loads applied in
A Mobile Ad hoc Network (MANET) is a collection of mobile nodes, that forms on the fly a temporary wireless multi-hop network in a self-organizing way, without relying on any established infrastructure. In MANET, a pair of nodes exchange messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. For this purpose, an efficient routing protocol is required. This paper introduced performance study of three of MANET protocols (AODV, GRP and OSPFv3). This study was one of the newer studies because wireless communication played an important role in today’s application and the field of mobile ad hoc network becomes very popular for the researchers in the last years. This study w
... Show MoreThe current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .