The primary objective of this study is to manage price market items in the construction of walls for affordable structures with load-bearing hollow masonry units using the ACI 211.1 blend design with a slump range of 25-50 mm that follows the specification limits of IQS 1077. It was difficult to reach a suitable cement weight to minimum content (economic and environmental goal), so many trail mixtures were cast. A portion (10-20%) of the coarse aggregates was replaced with concrete, tile, and clay-brick waste. Finally, two curing methods were used: immersion under water as normal curing, and water spraying as it is closer to the field conditions. The recommendation in IQS 1077 to increase the curing period from 14 to 28 days was taken into account. The results proved that the compressive strength of the blocks of cured immersion under water increased by 2.63%-0.63% and 5.12%-7.88% for 10% and 20% concrete waste aggregates, decreased by 0,3.84% and 4.22%,6.41% for 10% and 20% tile waste aggregates, and decrease by 5.71%-6.10% and 12.1%-11.4% for 10% and 20% brick waste aggregates, respectively at 14 and 28 days, and beams that were cured by spraying performed a little worse than those immersed under water.
The effects of T-shaped fins on the improvement of phase change materials (PCM) melting are numerically investigated in vertical triple-tube storage containment. The PCM is held in the middle pipe of a triple-pipe heat exchanger while the heat transfer fluid flows through the internal and external pipes. The dimension effects of the T-shaped fins on the melting process of the PCM are investigated to determine the optimum case. Results indicate that while using T-shaped fins improves the melting performance of the PCM, the improvement potential is mainly governed by the fin’s body rather than the head. Hence, the proposed T-shaped fin did not noticeably improve melting at the bottom of the PCM domain; additionally, a flat fin is ad
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreAphelenchus avenae was isolated from the wheat crown in Summel distract- Duhok, Kurdistan region-Iraq infected by a crown rot disease which is caused by Fusarium spp; wheat's crown culturing on Potato Dextrose Agar (PDA) and incubating at 25°C A. avenae was found associated with fungal culture which meant that fungal nematode was parasitic on crown rot fungi on wheat crown, this species was described for the first time in Iraq.
Fungal Nematode incubated with Fusarium graminearum, F. oxysporum and Verticillium dahliae reproduce in both solid and liquid media, best results of nematode reproduction were recorded on F. graminearum followed by F. oxy
... Show MoreSynthesis and preliminary biological evaluation of imidazo (2, 1-b) Thiazole derivatives is reported. Under Mannich conditions, a series of new imidazo (2, 1-b) Thiazole derivatives were synthesized. Starting from the reaction of 2- amino thiazole with 4- bromo phenyl bromide to produce 5-(4-bromo phenyl) imidazo (2, 1-b) thiazoles, following by introduce the substituted aminomethyl at position 6-by reacting with different aromatic amines under Mannich conditions to afford 6-secondary amine-5-(4-bromo phenyl) imidazo (2,1-b) thiazole in high yields.
FT-IR, 1H NMR, and 13C NMR techniques were used to characterize the synthesized derivatives. In addition, all compounds were tested for their antioxidant activity, and thr
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreThe electrochemical polymerization of the monomer sulfanilamide (SAM) in an aqueous solution at room temperature produces polysulfanilamide (PSAM). The Fourier Transform Infrared spectroscopy (FTIR) was used to investigate the properties of the prepared polymer layer that generated on the stainless steel (St.S) surface (working electrode) and Atomic Force Microscope (AFM) was used to characterize the morphology, topology, and detailed surface structure of polymer layer that generated on the surface. The corrosion behavior of uncoated and coated St.S were evaluated by using the electrochemical polarization method in a 0.2 M HCl solution and a temperature range of 293–323 K, the anticorrosion action of the polymer coating on stainless steel
... Show MoreThe theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreThis experiment was carried out in the College of Agricultural Engineering Sciences, Univ. of Baghdad, during autumn 2021 growing season to investigate possibility study of increase lettuce antioxidant and biological yield, growing and producing lettuce hydroponically under film technique (NFT) using a globally approved standard solution (Cooper solution), Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is LED light (B and R), Then levels of second factor were randomly distributed within each replicate, which included spraying with organic nutrients which was Cymbopogon citratus and Hibiscus sabdariffa at two