The waste material problem in today's world has become a major topic affecting all sectors of human life. Researchers are interested in providing solutions for each kind of waste material. Waste glass is one of the waste materials whose amounts increase daily. This article deals with two types of modified cement mortar with glass granular in the masonry wall to find their effect on the wall's property (direct tensile, flexural, and compressive bond strength). Seven different mixes were prepared according to the used glass granular ratio (three mixes contained white glass with 15, 20, and 25% while three of them contained green glass granular 5, 10, and 15%, and the last mix was a controlled mix which contains no glass granular).Based on the obtained result, the used white glass granular provides optimum compression and direct tensile bond strength when 20% of sand is replaced with white glass granular; optimum direct tensile bond value was obtained, which increased by 1.4% and increased compressive strength by 13.08% compared to control mortar. Green glass granular provides optimum compression and direct tensile bond strength when 10% of sand is replaced, direct tensile strength by 1.02%, and increased compressive strength by 3.7% compared to control mortar. The increase of the used waste glass granular in the mortar decreases flexural bond strength, and the amount of decrease depends on the chemical glass compositions.
We demonstrate the results of a mathematical model for investigation the nonlinear Stimulated Brillouin Scattering (SBS), which can be employed to achieve high optical amplifier. The SBS is created by interaction between the incident We demonstrate the results of a mathematical model for investigation the nonlinear Stimulated Brillouin Scattering (SBS), which can be employed to achieve high optical amplifier. The SBS is created by interaction between the incident light and the acoustic vibration fiber. The design criteria and the amplification characteristic of the Brillouin amplifier is demonstrated and discussed for fiber Brillouin amplifier using different pump power with different fiber length. The results show, high Brillouin gain can
... Show MoreObjective: The aim of this study is to determine the factors affecting birth space interval in a sample of women.
Methodology: A cross-sectional study conducted in primary health centers in Al-Tahade and Al- Shak Omar in
Baghdad city. Data were collected by direct interview using questionnaire especially prepared for the study.
Sample size was (415) women in age group (20-40) years who were chosen randomly.
Results: Analysis of data shows highest rate of women (31.8%) had a birth space interval of (8-12) months
followed by (26.7%) had a birth space interval of (19-24) months, (20.2%) had a birth space interval of (>24)
months and (16.1%) had a birth space interval of (13-18) months respectively, while lower rate of w
The cinematic story depends on many construction techniques that together constitute the story features technically and the secondary events are considered one of these basic techniques that are directly affected by the employment mechanisms inside the cinematic achievement. This subject initiated the two researchers to decide the title of the research: (Mechanisms of Employing Secondary Event in Cinematographic Discourse). The research is divided into an introduction that included the problem details, the aim and defining the terms used. The first section was the act and the event in the cinematic story, which addressed the relation between the act and the event and the nature of the simulation that tries to ascend the human act
... Show MoreKE Sharquie, AA Noaimi, AG Al-Ghazzi, Journal of Dermatology & Dermatologic Surgery, 2015 - Cited by 19
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.