A step to net-zero of carbon dioxide losses in the microalgae cultivation process was targeted in the current study. This research was carried out by using pre-dissolved inorganic carbon (DIC) as a source of carbon with two doses of twenty-five and fifty millilitres.
Material obtained from the demolition of concrete structures and milling of flexible pavements has the highest potential for recyclability. This study aimed to evaluate the performance of hot mix asphalt with the concurrent use of recycled asphalt pavement (RAP) and recycled concrete aggregate (RCA). Contents of RAP and RCA were varied from 0% to 50% by fixing the total recycling materials percentage to 50%. Penetration grade 40/50 virgin binder and waste engine oil (WEO) as rejuvenator were used in the present study. A series of tests, such as Scanning electron microscopy (SEM), Marshall stability, indirect tensile strength test, IDEAL CT, uniaxial compression test, and resilient modulus test, were carried out to assess the performance of
... Show More Thsst researcher problem of delays faced by researchers are all waiting to evaluate their standards by the experts who must take their views to extract the truth Virtual important step first step in building standards whatsoever, then the difference of opinion among experts about the paragraphs Whatever the scope of their functions, leading to confusion in maintaining these paragraphs or delete? Or ignore the views and opinion of the researcher to maintain the same? Or as agreed upon with the supervisor if he was a student? Especially if the concepts of a modern new building.
Therefore, the researcher sought to try to find a solution to her problem to conduct an experiment to test building steps
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show More