There are serious environmental problems in all countries of the world, due to the waste material such as crushed clay bricks (CCB) and in huge quantities resulting from the demolition of buildings. In order to reduce the effects of this problem as well as to preserve natural resources, it is possible to work on recycling (CCB) and to use it in the manufacture of environmentally friendly loaded building units by replacing percentages in coarse aggregate by volume. It can be used as a powder and replacing of percentages in cement by weight and study the effect on the physical and mechanical properties of the concrete and the masonry unit. Evaluation of its performance through workability, dry density, compressive strength, thermal conduct
... Show MoreA Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath
Drawing upon the recent theoretical framework of Burkean concept of identification (ID), the current study aims at probing the interaction of content and form in two letters penned by Iran’s Supreme Leader and addressed to the Youth on Jan. and Nov. 2015. To this end, the study seeks (i) to determine a role ID takes in the conveyance of intended assumptions to the targeted readers; and (ii) to observe if the writer’s objectives, i.e. to identify himself with the readers and to realize his politically-religiously-infused creeds, result in success or failure; moreover, (iii) it seeks to determine how he achieved his end to attenuate the impacts of blazing inferno of Islamophobia and anti-Islam sentiments in his addressees. The who
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreVerbal Antonyms: A research in the relationship in meaning Between the words in Arabic language
The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreIonic liquids (ILs) have been recognized for their potential as environmentally friendly solvents when compared to traditional organic solvents. Additionally, their function goes beyond that of solvents, and cocatalysts, as they frequently act as stabilizing agents and ligands for the metal-active species and intermediates in catalytic systems. This comprehensive review primarily focuses on the application of Pd-incorporated ILs in catalyzing cross-coupling Suzuki reactions. The responses play a vital role in creating a wide range of structurally diverse and highly functionalized organic compounds, focusing specifically on nucleopalladation Suzuki coupling reactions. The review provides a detailed summary of the reaction conditions, stereos
... Show More