This paper deals with the role of the clergy in the Church and artists in the emergence of this art, which is represented by an atmosphere of spiritual, aesthetic, artistic, technical and engineering very magnificence and is located in two Find.Chapter One: the stages of stained glass in the Middle AgesThe Architects Goths to get rid of the walls gradually, based Baloctav plane, columns and beams strengthened with the vehicle, as previously mentioned, making the building looks like a glass of excessive use of colored windows building, this art has been known to the art of stained glass And the second chapter: the stages of stained glass in the Middle Ages Department of Winston (Winston) works of stained glass since its inception in the tenth century to the Renaissance into three main stages:Each of these stages characteristics distinguish them, and show architectural style,The first stage: the English and called early, and start this stage since the inception of stained glass until the thirteenth century.Phase II: called ornate style in the fourteenth century.The third stage: is called a phase-based glass that separates the Middle Ages (the art of stained glass) for the Renaissance located this stage in the fifteenth century.And between each of these stages a very short period of transition does not Taataada ten years
A hierarchically porous structured zeolite composite was synthesized from NaX zeolite supported on carbonaceous porous material produced by thermal treatment for plum stones which is an agro-waste. This kind of inorganic-organic composite has an improved performance because bulky molecules can easily access the micropores due to the short diffusion path to the active sites which means a higher diffusion rate. The composite was prepared using a green synthesis method, including an eco-friendly polymer to attach NaX zeolite on the carbon surface by phase inversion. The synthesized composite was characterized using X-ray diffraction spectrometry, Fourier transforms infrared spectroscopy, field emission scanning electron microscopy, energy d
... Show MoreTo evaluate the bioactivity and the cytocompatibility of experimental Bioglass-reinforced polyethylene-based root-canal filling materials. The thermal properties of the experimental materials were also evaluated using differential scanning calorimetry, while their radiopacity was assessed using a grey-scale value (GSV) aluminium step wedge and a phosphor plate digital system. Bioglass 45S5 (BAG), polyethylene and Strontium oxide (SrO) were used to create tailored composite fibres. The filler distribution within the composites was assessed using SEM, while their bioactivity was evaluated through infrared spectroscopy (FTIR) after storage in simulated body fluid (SBF). The radiopacity of the composite fibres and their thermal properties were
... Show MoreMoisture damage is described as a reduction in stiffness and strength durability in asphalt mixtures due to moisture. This study investigated the influence of adding nano silica (NS) to the Asphalt on the moisture susceptibility of hot-mix-asphalt (HMA) mixtures under different aging conditions. NS was mixed with asphalt binder at concentrations of 2%, 4%, and 6% by weight of the binder. To detect the microstructure changes of modified Asphalt and estimate the dispersion of NS within the Asphalt, the field emission scanning electron microscope (FE-SEM) was used. To examine the performance of Asphalt mixed with NS at different aging stages (short-term and long-term aging), asphalt mixture tests such as Marshall stability,
... Show MoreObjective: Preparing training in a diverse style for young basketball players, and identifying the effect of training in a diverse style on some physical abilities (for young basketball players).Research methodology: the researchers chose the experimental method to know the research problem and its objectives, as it is represented by designing two equal groups, the control and the experimental, with pre- and post-tests. The study community was determined by youth basketball players for the 2023-2024 season, as the research community is (104) players, and a sample of (20) players was drawn from the youth category from Al-A'dhamiyah Sports Club, and it was chosen intentionally because they are the clubs most committed to training, as
... Show MoreBackground: Adipose derived-mesenchymal stem cells have been used as an alternative to bone marrow cells in this study. Objective: We investigated the in vitro isolation, identification, and differentiation of stem cells into neuron cells, in order to produce neuron cells via cell culture, which would be useful in nerve injury treatment. Method: Mouse adipose mesenchymal stem cells were dissected from the abdominal subcutaneous region. Neural differentiation was induced using β-mercaptoethanol. This study included two different neural stage markers, i.e. nestin and neurofilament light-chain, to detect immature and mature neurons, respectively. Results: The immunocytochemistry results showed that the use of β-mercaptoethanol resulted in
... Show MoreHigh-volume traffic with ultra-heavy axle loads combined with extremely hot weather conditions increases the propagation of rutting in flexible pavement road networks. Several studies suggested using nanomaterials in asphalt modification to delay the deterioration of asphalt pavement. The current work aims to improve the resistance of hot mix asphalt (HMA) to rutting by incorporating Nano Silica (NS) in specific concentrations. NS was blended into asphalt mixtures in concentrations of 2, 4, and 6% by weight of the binder. The behavior of asphalt mixtures subjected to aging was investigated at different stages (short-term and long-term aging). The performance characteristics of the asphalt mixtures were evaluated using the Marshall s
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More