The increasing use of plastics in various aspects of modern life resulted in the availability of enormous amount of wastes, including a negative effect on the environment and humans. So it is necessary to find solutions to deal with these wastes and ensure to use them as solutions to use in concrete mix . In this research the production of concrete containing high and low density polyethylene has been used by (5, 10, 15)% as a replacement of part of the volume of sand, so as to obtain concrete good compressive strength as well as other benefits such as improved possibility of pumping concrete and reduce the loss of concrete for workability polymer is a material that is non-absorbable of water . It is also intended to dispose of these wastes positively to achieve benefits to the environment and humans alike .
The article includes the concept of aesthetics through what has been dealt with in the literature by philosophers and researchers who have addressed this concept in an attempt to derive indicators of aesthetics. The article adopted a descriptive and analytical methodology by reviewing recent literature on the concept of aesthetics and its relation to urban planning and design issues. Many subjective and objective aesthetics indicators have been identified, some of which are classified under real aesthetics, and some under fake aesthetics. The indicators were applied to the Kufa Mosque complex and Sahla Mosque complex as a comparative case study. It was found that the indicators of real aesthetics have a higher weight in determining
... Show MoreRheological instrument is one of the basic analytical measurements for diagnosing the properties of polymers fluids to be used in any industry. In this research polycarbonate was chosen because of its importance in many areas and possesses several distinct properties.
Two kinds of rheometers devices were used at different range of temperatures from 220 ˚C-300 ˚C to characterize the rheological technique of melted polycarbonate (Makrolon 2805) by a combination of different investigating techniques. We compared the results of the linear (oscillatory) method with the non-linear (steady-state) method; the former method provided the storage and the loss modulus of melted polycarbonate, and presented the Cox-Merz model as well. One of the
A novel ligand, (E)-5-((2-hydroxy-4,6-dimethylphenyl)diazenyl)-2,3-dihydrophthalazine-1,4- dione, was synthesized through the reaction of 3,5-dimethylphenol with the diazonium salt of 5-amino-2,3-dihydrophthalazine-1,4-dione. The ligand underwent characterization through the utilization of diverse spectroscopic methods, including UV-Vis, FT-IR, 13C, and 1H-NMR, alongside Mass spectroscopy and micro elemental analysis (Carbon, Hydrogen, Nitrogen, and Oxygen). Metal chelates of transition metals were prepared and analyzed using elemental analysis, mass spectra, atomic absorption, UV-Vis, FT-IR spectral analysis, as well as conductivity and magnetic measurements. The investigation into the compounds’ nature was conducted by utilizing mole r
... Show MoreThe management of wisdom is concerned with the level of expertise, methods of transmission, use and ability to problems and their impact on behavior and human behavior in order to improve it in the form of successful decisions. The importance of management of wisdom in making successful decisions that ensure the survival and development of society through the provision of leaders capable of planning, organization and decision-making to achieve the goals and objectives required in a complex and changing environment. Where the administration faces positions and problems that require operational decisions to organize the activities of the institution in line with the strategic decisions already taken under the proper strategic planning. The ex
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreLet M is a Г-ring. In this paper the concept of orthogonal symmetric higher bi-derivations on semiprime Г-ring is presented and studied and the relations of two symmetric higher bi-derivations on Г-ring are introduced.
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More