Corrosion- induced damage in reinforced concrete structure such as bridges, parking garages, and buildings, and the related cost for maintaining them in a serviceable condition, is a source of major concern for the owners of these structures.
Fly ash produced from south Baghdad power plant with different concentrations (20, 25 and 30) % by weight from the cement ratio were used as a corrosion inhibitor as a weight ratio from the cement content.
The concrete batch ratio under study was (1:1.5:3) cement, sand and gravel respectively which is used in Iraq. All the raw materials used were locally manufactured.
Concrete slabs (250x250x70) mm dimensions were casted, using Poly-wood molds. Two steel bars were embedded in the central position of each slab at the mid- height (about 35 mm), with a space of 100 mm between each other.
A 16 concrete slabs were prepared (0, 20, 25 and 30) wt. % of fly ash. The specimens were partially immersed in 3.5 wt. % NaCl solution in order to predict the corrosion.
Half-cell potential test technique was used to estimate the corrosion rate which is occurred in the steel bar due to the migration of chloride ions through the concrete, depending on the ASTM C876-08.
The result shows that the potential values of steel in concrete were shifts to the positive direction with increasing the percentage of fly ash, because the reduction of porosity by the addition of fly ash which fill the pores and inhibit the chloride ions to reach to steel.
The results also show that the further increase of fly ash (30%) the possibility of carbonation is increased which result in reduction its alkalinity, thereby permitting corrosion of embedded steel.
The objective of this study was to isolate and identify the asparaginase-producing bacteria, then purify and characterize the enzyme in order to investigate their properties in the future. Fifteen local bacterial isolates were isolated from various sites in the city of Baghdad, identified by conventional morphological and biochemical procedures, and confirmed using vitek 2 methods, and submitted to primary screening processes for asparaginase production. For secondary screening, eight isolates with the greatest yellow zone ability on a specific solid medium were chosen. Bacillus sp. was reported to have the highest enzyme production (7.5 U/mg proteins). After 24 hours of incubation, submerged fermentation yielded optimal conditi
... Show MoreHazardous materials, heavy metals, and organic toxins released into the environment have caused considerable harm to microbes, plants, animals, and humans. Wastewater is one of the most contaminated ecosystems due to heavy metals emitted mostly by human activity. Bioremediation of wastewater is an ecologically acceptable and cost-effective method of removing heavy metals from sewage; the general purpose of this study is to analyse the dependability of anaerobic sludge biomass in removing sulfur compounds and heavy metals from waste water. The anaerobic sludge biomass evaluated in this work was taken from a wastewater treatment plant (WWTP) in Al-Rustumiya, Baghdad, and grown in the mineral medium for anaerobic growth. In serum bottl
... Show MoreThe effect of operating parameters on the batch scale separation of hydrocarbon mixture (benzene and hexane) using
emulsion liquid membrane technique is reported. Sparkleen detergent was used as surfactant and heavy mineral oil as
solvent to receive the permeates.
From the experimental results, the parameters that influenced the permeation are, composition of feed, contact time
with solvent, ratio of volume of solvent to volume of hydrocarbon feed, ratio of volume of surfactant solution to volume
of hydrocarbon feed, surfactant concentration, mixing intensity and glycerol as polar additive in the surfactant solution
to eliminate drop breakup.
The best conditions for the separation in this study were found to be: comp
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
The aim of this study is to investigate the ability of malachite green (MG) combined with 650nm diode laser to kill Candida albicans and to spectrally study the MG photodegradation after photodynamic therapy (PDT) spectrally. Cultures of Candida albicans were exposed to 40mW, 650 nm diode laser in the absence of MG. In PDT group, the MG was added to the Candida suspension for 5 min then exposed to diode laser for (5, 10, 15, 20) min at power density of 0.59W/cm2. The absorption spectrum of the photosensitized fungal suspension was obtained. The data were submitted to T-test (p<0.05). A 650nm diode laser in the presence of MG reduced the number of CFU/ml in 98.4%. Laser with 650nm alone and MG alone did not reduce significantly the num
... Show MoreWhen laser light incident on biological tissue, it is either reflected from the
surface of the tissue (e.g. the skin) or scattered inside the tissue or absorbed .The laser light will be
absorbed by water, hemoglobin and melanin. Absorption is also highly dependent on wave-length of
laser radiation. The absorbed light is converted into kinetic energy leading to laser effect that when
appropriately applied can produce reaction ranging from incision, vaporization to coagulation. Aim of
the study: To evaluate the efficiency of diode Laser 810 ± 20nm in treatment of oral lesions. Methods:
6 patients (2 females and 4 males) with different oral lesions were treated in the hospital of specialized
surgeries by the use of dio
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More