Industrial development has recently increased, including that of plastic industries. Since plastic has a very long analytical life, it will cause environmental pollution, so studies have resorted to reusing recycled waste plastic (sustainable plastic) to produce environmentally friendly concrete (green concrete). In this research, producing environmentally friendly load-bearing concrete masonry units (blocks) was considered where five concrete mixtures were compressed at the blocks producing machine. The cement content reduced from 400 kg/m3 (B-400) to 300 kg/m3 (B-300) then to 200 kg/m3 (B-200). While (B-380) was produced using 380 kg/m3 cement and 20 kg/m3 nano-silica sand powder, and 10% plastic waste instead of coarse aggregate. Finally (B-285) included 285 kg/m3 cement and 15 kg/m3 nano silica sand powder and 10% plastic waste replacement for coarse aggregate. All production of concrete masonry unit types. According to IQS 1077 /1987, except (B-200) and (B-285) type B. When increasing the curing age from 14 to 28 days, blocks (B-285and B-380) change from type B to A. The compressive strength of the types (B-400, B-300, B-200, B-380, and B-285) was (9.65, 7.11, 5.35, 6.57, and 5.86) MPa, respectively, at 14 days and (11.98, 9.33, 6.84, 8.62 and 7.64) MPa respectively at 28 days.
<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi
... Show MoreThe dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather
... Show MoreThe dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreCryptocurrency became an important participant on the financial market as it attracts large investments and interests. With this vibrant setting, the proposed cryptocurrency price prediction tool stands as a pivotal element providing direction to both enthusiasts and investors in a market that presents itself grounded on numerous complexities of digital currency. Employing feature selection enchantment and dynamic trio of ARIMA, LSTM, Linear Regression techniques the tool creates a mosaic for users to analyze data using artificial intelligence towards forecasts in real-time crypto universe. While users navigate the algorithmic labyrinth, they are offered a vast and glittering selection of high-quality cryptocurrencies to select. The
... Show MoreInfertilityis oneuof the most problemsathatufacingaadvancedunations. In the general, about halfof allacasesaof the infertility are causedby factors thaturelated toathe male partner. Propos educausesvofumalev infertility include evgeneticuand environmental factors. Blood samples from 64 infertileumen allawere living in urban its al-Fallujah city (30 azospermeiauand 34 oligospermeia) and 32 fertile men (asuthe control group) were collected. Heavy metal concentrations inusera of infertile and fertile groupswereumeasured by using Atomic Absorption Spectrophotometer. Y- chromosomemicrodeletions were detected by using PCR techniques. Significantdifferences (P?0.05)uin the concentration ofucopper (0.0267±0.0147 and 0.0278±0.0273, for infertileua
... Show MoreWhat happened on the Iraq war in 2003 put the problematic about what can happen from a shift in the style of individual or collective in contemporary Iraqi art similar to what is known in the history of the modern art world.
It wanted the researcher to identify this dilemma in academic study looking for an explanation of this Alastfhamat from the entrance of the definitions shows laparoscopic destination, as it determines the address (b style in painting contemporary Aeraa before and after the war) was a comparative analysis, through a choice of two Iraqi artists who have production style known sets since before the war, in order to read the transformation that took place in art before and after their tactics, and in order to off
... Show MoreThe basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.