The main factors that make it possible to get the corrosion of reinforcing steel in concrete are chloride ions and the absorption of carbon dioxide from the environment, and each of them works with a mechanism which destroys the stable immunity of rebar in the concrete. In this work the effect of carbon dioxide content in the artificial concrete solution on the corrosion behavior of carbon steel reinforcing bar (CSRB) was studied, potentiostatically using CO2 stream gas at 6 level of concentrations; 0.03 to 2.0 weight percent, and the effect of rising electrolyte temperature was also followed in the range 20 to 50ᴼ C. Tafel plots and cyclic polarization procedures were obeyed to investigate the corrosion parameters and pitting susceptibility respectively. The change in the microstructure and morphology of the CSRB after polarization in the simulate concrete solution was studied using optical and atomic force microscopes. The results show that the corrosion rate of the CSRB in artificial concrete greatly increases with the existence of CO2 gas and highly depends on its concentration in the range 0.03 to 2.0% .No sign for pitting corrosion is recorded at all CO2 concentrations and the general corrosion is the main problem in the conditions under consideration.
Faith is a feature of the Mesopotamian population, since the ancient Mesopotamian was a believer and obedient to his God in any case, and this encouraged the emergence of some of the phenomena interpreted by historians as an integral part of the civilization and ancient history of this country, and these phenomena are the phenomena of the deification of kings for themselves, The first phenomenon was a personal endeavor for the uniqueness of power, sometimes to correct some mistakes in societies to balance the state, and civil rule is independent of religious rule, and the second was the result of divination and predictions of omen, in the case of any bad harbinger of the king, such as the occurrence of eclipse To the sun or a lunar eclip
... Show MoreBreast cancer is the most commonly diagnosed cancer and remains one of the main reasons of cancer-related mortality in women worldwide. KRAS variant rs61764370 (T>G) is associated with an increased risk of occurrence of many cancers, Here The case-control study was accomplished on 135 women including 45 women with breast cancer patients, 45 women with benign breast lesions and 45 healthy women to analyze the association of KRAS variant rs (61764370 T>G) with breast cancer. LCS 6 variant in KRAS gene was amplified by using specific primers, then genotype was detected after sequencing the PCR products. The results showed that the genotype and allele frequency of TT and GT allele of KRAS
... Show MoreIn this study, gamma-ray spectrometry with an HPGe detector was used to measure the specific activity concentrations of 226Ra, 232Th, and 40K in soil samples collected from IT1 oil reservoirs in Kirkuk city, northeast Iraq. The “spectral line Gp” gamma analysis software package was used to analyze the spectral data. 226Ra specific activity varies from 9 0.34 Bq.kg-1 to 17 0.47 Bq.kg-1. 232Th specific activity varies from 6.2 0.08 Bq.kg-1 to 18 0.2 Bq.kg-1. 40K specific activity varies from 25 0.19 Bq.kg-1 to 118 0.41 Bq.kg-1. The radiological hazard due to the radiation emitted from natural r
... Show MoreThe use of different materials in the art of ceramics is considered a new form of contemporary philosophical trends. That was introduced to art as a result of societal changes and transformations and rapid technological development. And it plays a very essential part in the beauty of the artistic structure. The contrast of using different materials in ceramics is considered a part of the old historical achievements since the art of ceramics used to follow strict standards. Which does not apply to contemporary ceramic, Because recently, it has become free from any religious and social control and created a whole new intellectual context, heading to new horizons in which it works with the newly added materials as a strategy to ensure the a
... Show MoreFor the purpose of achieving the desired goal of the educational learning process, it was necessary to devote attention to educational means and employ them in this field because of their great role in overcoming the difficulties facing the learning process and providing an educational environment that keeps abreast of the scientific developments. This is the goal of the research in which the researchers wanted to know the effect of the educational techniques in the development of apprentice students' skills in teaching.
The research consisted of the problem of the research which is: what is the impact of educational techniques on developing the apprentice students' teaching skills in the Faculty of Fine Arts? In addition to its imp
Abstract
This study aims to identify the degree to which the first cycle teachers use different feedback patterns in the E-learning system, to identify the differences in the degree of use according to specialization, teaching experience, and in-service training in the field of classroom assessment as well as the interaction between them. The study sample consisted of (350) female teachers of the first cycle in the governmental schools in Muscat Governorate for the academic year 2020/2021. The study used a questionnaire containing four different feedback patterns: reinforcement, informative, corrective, and interpretive feedback. The psychometric properties of the questionnaire were verified in terms of validity
... Show MoreAn experiment was conducted to study the effect of the sprayer type according to the source of power and the size of the spray nozzle concerning the quality of the spray produced and fuel consumption.Two types of sprayers were used: a conventional boom sprayer (S1) and a modified (electrified) boom sprayer (S2), along with three sizes of the XR TeeJet 110 spray nozzle (N). The following technical performance indicators were examined: Density of coverage (drops/cm2) using ImageJ software, a 600dpi business card scanner, specifically the ScanShell 800N by CSSN, Inc, and water-sensitive paper (WSP), rate of spray nozzles discharge (ml/min), and fuel consumption (liters/hectare) using a c
Land Transport regards a main element in the In Fra – structure of the national economy where distance and time shortness, open new opportunities of work, develop the different regions and rise the standard of living….
It is necessary to emphasize that the circumastances surrounding Iraq such as wars, economic sanctions, blockade occupation effected negatively upon economic Indicators of land Transportion including Value of output Value added contraction of Investment allocation and Investment expend tuer and the period of implementation and fulfillment of the projects of Land Transport to be ready to offer their service in underdeveloped country Like Iraq aiming to satisfy Fast and acomprehensi
... Show MoreThe study aims at investigating the effectiveness of the Virtual Library Technology, in developing the achievement of the English Language Skills in the Center of Development and Continuous Education, in comparison with the individual learning via personal computer to investigate the students' attitude towards the use of both approaches. The population of the study includes the participants in the English Language course arranged in the Center. The sample includes 60 students who were randomly chosen from the whole population (participants in English Courses for the year 2009-2010). The sample is randomly chosen and divided into two experimental groups. The first group has learned through classroom technology; while the other group has l
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More