Push-out test of waste sawdust-based steel-concrete – Steel composite sections: Experimental and environmental study
...Show More Authors
The genera and species of Liliaceae show a considerable structural diversity of leaves and especially stems. This paper presents a morphological and anatomical study of the leaves and stems of Asphodelus microcarpus. The results showed that the investigated species had typical morphological characters. and also that it could be distinguished from another plant not only by its morphological but anatomical characters as well.
In contrast to the classical antibacterial sulfa drugs that are unsubstituted or monosubstituted, our newly synthesized analogs were designed to obtain sulfonamide moiety containing disubstituted hetero nitrogen atom. These compounds were formed successfully by chlorosulfonation of acetanilide and the product was treated with different cyclic amines and finally amide hydrolysis was necessary to get agents that were analyzed for IR, UV, CHN, melting points and solubility. At last, we studied their antibacterial activity on certain types of bacteria and we noticed the inactivity due to possible steric factor. Principly, this means these products have no inhibiting action against the used microbes.
In this research has been the manufacture and study the properties of the solar cell type retail hybrid manner thermal evaporation emptiness were studying the properties of the cell at room temperature showed measurements stream circuit behavior linear cell manufacturers reached were calculated efficiency tool cell manufacturers, as well as the expense of workers filling the cell
The current study included the collection of 175 samples of blood (Urea-blood) of patients with rheumatoid arthritis from Al–Al-Kindy Teaching Hospital, Baghdad Teaching Hospital and Al-Imamian Al-Kadhimyain Medical City in Baghdad from both sexes with different ages at the period between 1/10/2016-1/2/2017. Bacterial growth results showed that 80% of urea for bacterial transplantation were positive results, while the number of samples showing no bacterial growth was 20%. The bacterial isolation evaluate for morphological testes and biochemical microscopy, as well as identification by Api system. The highest frequency of inflectional bacteria was E. coli (41.97%), followed by E. cloacae (21.25%), P. aeruginosa (12.5%), Salmonella (10%), K
... Show MoreThe study presents the performance of flexural strengthening of concrete members exposed to partially unbonded prestressing with a particular emphasis on the amount (0, 14.2, and 28.5%) of cut strands-symmetrical and asymmetrical damage. In addition to examining the influence of cut strands on the remaining capacity of post-tensioned unbonded members and the effectiveness of carbon fiber reinforced polymer laminates restoration, The investigated results on rectangular members subjected to a four-point static bending load based on the composition of the laminate affected the stress of the CFRP, the failure mode, and flexural strength and deflection are covered in this study. The experimental results revealed that the usage of CFRP la
... Show MoreBackground: The high reactivity of hydrogen peroxide used in bleaching agents have raised important questions on their potential adverse effects on physical properties of restorative materials. The purpose of this in vitro study was to evaluate the effect of in-office bleaching agents on the microhardness of a new Silorane-based restorative material in comparison to methacrylate-based restorative material. Materials and method: Forty specimens of Filtek™ P90 (3M ESPE,USA) and Filtek™ Supreme XT (3M ESPE, USA) of (8mm diameter and 3m height) were prepared. All specimens were polished with Sof-Lex disks (3M ESPE, USA). All samples were rinsed and stored in incubator 37˚C for 24 hours in DDW. Ten sample of each material were subjected to
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreIn this paper, we implement and examine a Simulink model with electroencephalography (EEG) to control many actuators based on brain waves. This will be in great demand since it will be useful for certain individuals who are unable to access some control units that need direct contact with humans. In the beginning, ten volunteers of a wide range of (20-66) participated in this study, and the statistical measurements were first calculated for all eight channels. Then the number of channels was reduced by half according to the activation of brain regions within the utilized protocol and the processing time also decreased. Consequently, four of the participants (three males and one female) were chosen to examine the Simulink model during di
... Show More