The using of waste products as a recycled material was one of the most important studies for saving money and reduces the pollution. Mortar and concrete mixes with (10, 20 and 30)% of brick, glass and tile powder as replacement by weight of cement was investigated. The concrete mixes using brick or glass as 10%replacement of cement exhibited enhancement in compressive strength about (6, 4.7 and 2.0)% and (7.2, 5.6 and 2)% at age 7, 28 and 90 days respectively compared to reference mix. The 20% replacement of glass powder also showed an increase in the compressive strength up to (8, 6.3 and 4) %at age 7,28 and 90 days respectively compared to reference mix. Finally concrete mix using (10, 20 and 30) % tile powder as replacement of cement sho
... Show MoreThe inhibitive action of Reactive Red (RR31) dye against corrosion of carbon steel in 1M acetic acid solution has been studied using gravimetric method at temperature ranged (288-318)K. The antibacterial activity for the different concentrations of RR31 dye against different bacterial species was studied. The experimental data indicates that this dye acts as a potential inhibitor for carbon-steel in acetic acid medium and the protection efficiency increase with increasing (RR31) dye. The adsorption of (RR31) dye on the carbon steel surface was found to follow Langmuir adsorption isotherm. Thermodynamic data for the adsorption process such as Gibbs free energy change ∆Gads, enthalpy change ∆Hads, and entropy change ∆Sads were estima
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreAbstract
This study aims to find the relationships between social capital (social network, social trust, shared goals) and knowledge sharing (knowledge Donating, knowledge collecting) as independent variables and their impact on improving the quality of educational services (academic staffs quality, Quality of teaching methods and study curriculums). This research is an important, because it attempts to identify the relationship between social capital and the knowledge sharing and their effect on improving the quality of educational service for universities. The study problem was determined in several questions related to the nature of the correlation relationship - the impact between the different independent variables (
... Show MoreQuercetin, one of the flavonoids family member, can be found in many vegetables, fruits, and beverages with a noticeable nutritional pharmacological properties. This study was aimed to evaluate the ability of quercetin to inhibit lipopolysaccharide (LPS) that induced lethal toxicity in vivo, and to elucidate the importance of the quercetin as an antitumor agent in breast cancer cell line MCF-7.In vivo experiments included the effect of hesperidin and LPS on the liver and spleen of male mice. In the liver, the antioxidant activity was measured by estimating the concentration of glutathione (GSH), and catalase (CAT), while in the spleen, the concentration of cytokines was measured including IL-33 and TNF-α. In vitro experiments included MTT
... Show MoreThe main aim of this study is to investigate the ability of four local entomopathogenic isolates Beauveria bassiana (Bals.) and Metarhizium anisopliae (Met.) to control the mosquito larvae in the lab. The results revealed that the isolate (MARD48) B .bassiana reduced the survival rate of the mosquito larvae to (80%) followed by the isolate M. anisopliae (MARD10) to (90%) in the first two days of treatment, and 60 and 66% respectively in the third day. The results also showed that the isolate B. bassiana (MARD48) killed 50% of the population (LC50) with the concentration 1×104 conidia/ml compared to 1×107 conidia/ml for the isolates B. bassiana (MARD14) and M. anisopliae (MARD10), and 1×108 conidia/ml for the isolate B .bassiana (MARD76).
... Show MoreAn experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative , flowery growth , yield and its components in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1= cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses)
... Show MoreThe present paper focuses on the nature of the different interactions between cometary nucleus and tail with solar wind. The dynamics of the comet will impose many features that provide unique behavior of the comet when entering the solar system. These features are reviewed in this paper and few investigations are made. The calculations made in this work represent the analysis and interpretation of the different features of the comet, such as perihelion and eccentricity dependence on the gas production rate, and the dependence of the latter on the composition of the comet nucleus. The dependences of the heliocentric, bow shock, contact surface, and stand-off distances with gas production rate for many types of comets that cover linear and n
... Show MoreThe present article discusses innovative word-formation processes in Internet texts, the emergence of new derivative words, new affixes, word-formation models, and word-formation methods. Using several neologisms as an example, the article shows both the possibilities of Internet word-making process and the possibilities of studying a newly established work through Internet communication. The words selected for analysis can be attributed to the keywords of the current time. (In particular, the words included in the list of "Words of 2019") there are number of words formed by the suffix method, which is the traditional method of the Russian word formation. A negation of these words is usually made thro
... Show More