This research of using Feldspar in the production self compacting concrete (SCC) ( 5,10,15 )% as partial replacement by weight of cement .In this research some of fresh properties of SCC ( slump flow used V-funnel test and filling ability used ( U- box test ) for concrete mixes and also some of the harden properties of SCC ( compressive and flexural tests ). The research results showed that negative effect of Feldspar on the fresh properties of self compacting concrete but the positive effect of Feldspar on the harden properties of self compacting concrete .
The preparation and spectral characterization of complexes for Co(II), Ni(II), Cu(II), Cd(II), Zn(II) and Hg(II) ions with new organic heterocyclic azo imidazole dye as ligand 2-[(2`-cyano phenyl) azo ]-4,5-diphenyl imidazole ) (2-CyBAI) were prepared by reacting a dizonium salt solution of 2-cyano aniline with 4,5-diphenyl imidazole in alkaline ethanolic solution .These complexes were characterized spectroscopically by infrared and electronic spectra along with elemental analysis‚ molar conductance and magnetic susceptibility measurements. The data show that the ligand behaves a bidantate and coordinates to the metal ion via nitrogen atom of azo and with imidazole N3 atom. Octahedral environment is suggested for all metal complex
... Show MoreNew bidentate Schiff base ligand (L) namely [(Z)-3-(2-oxoindolin-3ylildeneamino)benzoic acid] type (NO) was prepared via condensation of isatin and 3-amino benzoic acid in ethanol as a solvent in existence of drops of (glac. CH3COOH). The new ligand (L) was characterized base on elemental microanalysis, FT-IR, UV-Vis, 1H-NMR spectra along with melting point. Ligand complexes in general formula [M(L)2Cl2]. H2O, where: MII = Co, Cu, Cd, and Hg; L= C15H10 N2O3 were synthesized and identified by FT-IR, UV-Vis, 1H-NMR (for Cd complex only) spectra, atomic absorption, chloride content along with molar conductivity and magnetic susceptibility. It was found that the ligand behaves as bidentate on complexation via (N) atom of imine group an
... Show MoreThis book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
This book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
Co-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreThe corrosion behavior of 2024 aluminium alloy was investigated in alkaline medium (pH=13) containing 0.6 . in absence and presence of different concentrations of three amino acids separately [Methionine, Glutamice acid and Lysine] as environmentally friendly corrosion inhibitors over the temperature range (293-308)K. Electrochemical polarization method using potentiostatic technique was employed. The inhibition efficiency increased with an increase of the inhibitor concentration but decreased with increase in temperature . The maximum efficiency value was found with lysine =80.4 of 293 k and 10 . concentration of lysine. The adsorption of the amino acids was found to obey Langmuir adsorption isotherm . Some thermodynamic parameter âˆ
... Show MoreBackground: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.