The presence of construction wastes such as clay bricks, glass, wood, plastic, and others in large quantities causes serious environmental problems in the world. Where these wastes can be used to preserve the natural resources used in construction and reduce the impact of this problem on the environment, it also works to reduce the problem of high loads of concrete blocks. Clay bricks aggregate (AB) can be recycled as coarse aggregate and replaced with volumetric proportions of coarse aggregate by ( 5% and 10%), as well as the use of clay brick powder (PB) by replacing its weight of cement (5% and 10%) and reduced in the manufacture of concrete blocks (blocks). Four mixtures will be prepared and tested to learn how to reuse the brick coarse aggregate ACB and PB powder brick as substitute materials for producing concrete blocks, use the water spray method to treat concrete building blocks (blocks) and check the Dimensions and compressive strength, and absorption.
This study aimed to assess the efficiency of Nerium oleander in removing three different metals (Cd, Cu, and Ni) from simulated wastewater using horizontal subsurface flow constructed wetland (HSSF-CW) system. The HSSF-CW pilot scale was operated at two hydraulic retention times (HRTs) of 4 and 7 days, filled with a substrate layer of sand and gravel. The results indicated that the HSSF-CW had high removal efficiency of Cd and Cu. A higher HRT (7 days) resulted in greater removal efficiency reaching up to (99.3% Cd, 99.5% Cu, 86.3% Ni) compared to 4 days. The substrate played a significant role in removal of metals due to adsorption and precipitation. The N. oleander plant also showed a good tolerance to the uptake of Cd, Cu, and Ni ions fr
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreThe modern teaching methods, and their importance in achieving the desired learning goals for the individual and the society, have been addressed, as it is necessary to develop the methods, ways and strategies used in the process of teaching the intermediate stages in the various fields in general and the field of physical education in particular, the importance of research is the effect of using the strategy of similarities in teaching some basic skills of basketball for students of the second intermediate. As for the problem of research, the researcher mentioned the lack of use of teachers’ strategy method similarities in the educational units because of its importance, and after study and analysis the researcher found it necessary to i
... Show MoreThe study focused on explaining urban expansion and sustainable development of urban land and explaining the role of population expansion in Al Hillah city, Al Hillah city in the center of Babylion Governorate located. The study relied on analyzing the population data of the city of Al Hillah for a period of time (22 years) for the period (2000-2022). This data was analyzed and its role in planning and designing residential areas and neighborhoods in the Al Hillah city was analyzed based on the standards of urban planning and sustainable growth of cities. Landsat 5TM was used in the investigation, Landsat 8OLI satellite data to retrieve the NDVI, NDBI, and NDWI. The findings showed th