In order to save natural resources, recycling necessarily becomes a top priority for all of us, to save exhaustible resources, produce green energy and preserve the environment.
In this perspective, we are trying to valorize a waste of animal origin, largely neglected by the actors of materials, through an industrial transformation into a biological charge to make new sustainable bio-composite materials.
Using a tensile test bench, we try to mechanically characterize this biomaterial of renewable resources that, unlike eco-composites, has been neglected by the material actors.
Obtained from waste, with a high recycling potential and from renewable resources, the bio-charge to be analyzed will be injected, later in different poly
Since independence in 1956, several attempts have been made to reform educational practices in the Moroccan education system, while going through several stages:Evaluation of the state of the Moroccan education system, determination of failures and the establishment of an effective strategy to improve the quality of education and training in the Moroccan public school.We focus on monitoring the establishment of the pillars of the reform, against the various difficulties that hinder the development of the education sector, from 1999 until today and towards the horizon of 2030. We provide data on the situation of the reform, then we analyze its various stages from a critical point of view, based on the reports of the court of auditors, to
... Show MoreThroughout this note, R is commutative ring with identity and M is a unitary R-module. In this paper, we introduce the concept of quasi J- submodules as a – and give some of its basic properties. Using this concept, we define the class of quasi J-regular modules, where an R-module J- module if every submodule of is quasi J-pure. Many results about this concept
Augmented reality to qualify a new form of interaction between the user and the machine based on the association of real objects, from the user's environment, and virtual. In Morocco the use of this technology in the learning context remains in the embryonic phase that tries to overcome several issues (Profile of the designers, Users, and the learning scenario). Scripting is primarily a work of content design, resource organization, activity planning and mediations to induce and accompany learning. The integration of augmented reality (AR) requires the contribution of the different specialists who work on the design and realization of the scenario. While the CRMEF AR project. CRMEF is at the end of a first phase of development, this cont
... Show MoreDigital technologies have come to shake up the traditional paradigm of learning, and to change the existing relationship of "know-teaching" to put in place a key concept of the time is "to accompany through digital tools Our intervention is part of a technical-pedagogical approach and will focus on an action research work in which we will try:
First, to present on line an accessible digital device that facilitates and organizes project planning and provides means to govern and control the quality of administrative acts.
Next, We will show the first results of the experimentation of this tool in our context of research represented by 355 directors of the secondary schools of the provincial delegation of Taza. Morocco, pointing out a

The aim of this research is to study the effect of heat transfer on the oscillating flow of the hydrodynamics magnetizing Eyring-Powell fluid through a porous medium under the influence of temperature and concentration for two types of engineering conditions "Poiseuille flow and Couette flow". We used the perturbation method to obtain a clear formula for fluid motion. The results obtained are illustrated by graphs.
An Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification.
In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreIn this paper, the adsorption behavior of Methylene blue dye by orange peels, which was chemically modified with sodium hydroxide, has been investigated. Physical and chemical properties of both sorbents under study were determined using Fourier Transform Infrared Spectrophotometer (FTIR), Scanning Electron Microscope (SEM), Atomic Force Microscope (AFM) and Brunauer, Emmett and Teller (BET) specific surface-area measurement techniques. Effect of the solution‒pH, adsorbent dose, adsorption time, temperature and initial methylene blue concentration were studied in batch experiments. The experimental data were fitted into the following kinetic models: pseudo-first order, pseudo-second order, and the intraparticle diffusion model. It was
... Show MoreIn this research paper, we explain the use of the convexity and the starlikness properties of a given function to generate special properties of differential subordination and superordination functions in the classes of analytic functions that have the form in the unit disk. We also show the significant of these properties to derive sandwich results when the Srivastava- Attiya operator is used.
Thirty water sample of wells, and three samples of springs from the upper most aquifer, as well as four samples from Lesser Zab River in Koi Sanjaq Basin, Erbil governorate of northern Iraq was collected and physically and chemically were analyzed. Physical analysis includes temperature, hydrogen ion concentration (pH), Electrical Conductivity (EC), Total Dissolved Solid (TDS), and Turbidity, whereas the geochemical analysis included concentration determines of the major, minor and trace elements. Chemical classification of the present samples using of chadha diagram explain that ( 95% ) of them located within field 5 and 6 whereas the rest (5%) are located in the field 8. According to Iraqi [9] and WHO [10] standers, most of the samples
... Show MoreEighty one bacterial isolates were obtained from 53 soil samples of different plants rhizosphere. All the isolated bacterial were screened for antifungal effect against Fusarium oxysporum . Three isolates gave antifungal activity with inhibition zone ranged between (0.5-2.5 cm). Two isolates (Bd1 and Bd2) were Brevundimonas diminuta, while the third (Pf1) was Pseudomonas fluorescence . B. diminuta (Bd1) which used in this study isolated from Raphanus sativus gave the highest inhibition zone against F. oxysporum. Cell free supernatant of B.diminuta(Bd1) was better in antifungal activity than bacterial cells against F. oxysporum. The highest antifungal substance production was obtained from mineral salt broth containing 1% peptone after in
... Show MoreTo transfer a satellite or a spacecraft from a low parking orbit to a geosynchronous orbit, one of the many transition methods is used. All these methods need to identify some orbital elements of the initial and final orbits as perigee and apogee distances. These methods compete to achieve the transition with minimal consumption of energy, transfer time and mass ratio consumed ), as well as highest accuracy of transition. The ten methods of transition used in this project required designing programs to perform the calculations and comparisons among them.
The results showed that the evaluation must depend on the initial conditions of the initial orbit and the satellite mechanical exception as well as
... Show MoreSufficient conditions for boundary controllability of nonlinear system in quasi-Banach spaces are established. The results are obtained by using the strongly continuous semigroup theory and some techniques of nonlinear functional analysis, such as, fixed point theorem and quasi-Banach contraction principle theorem. Moreover, we given an example which is provided to illustrate the theory.
In this paper, chaotic and periodic dynamics in a hybrid food chain system with Holling type IV and Lotka-Volterra responses are discussed. The system is observed to be dissipative. The global stability of the equilibrium points is analyzed using Routh-Hurwitz criterion and Lyapunov direct method. Chaos phenomena is characterized by attractors and bifurcation diagram. The effect of the controlling parameter of the model is investigated theoretically and numerically.
This study was carried out on two species of the Hygromiidae family Monacha
cantiana and Candidula gigaxii collected from six sites in three central Iraq
provinces (Baghdad , Babylon and Karbala) . A total of 1318 individuals of Monacha
cantiana and 173 of Candidula gigaxii have been examined during the study period
from October 2013 to July 2014.The study included estimation of species relative
abundance, population density and relationship with some physico- chemical
properties of the soil; temperature, moisture and pH.
The Monacha cantiana was present at all sites but with varying numbers, while
Candidula gigaxii was confined to only three sites: Aljadiriyah and Zafaraniya at
Baghdad, and Hindiya dam at Baby
This study includes isolation, purification, and identification of algae from the canal around Baghdad university Al-jadriah. Four unialgal cultures were obtained. These algal cultures included 3 species of cyanophyta ( Nostoc carneum, Westillopesis prolifica, Chroococcus turgidus), 1 species of chlorophyta (Chlorella vulgaris) . Different plants belonging to different families were collected and extracted for their oils which were Ricinus communis and Sesamum indicum (seeds), Matricaria chamomilla (flowers) .However, antialgal activity of the extracted oils were evaluated the isolated algae with 7 concentrations (0.09, 0.3, 0.5, 1, 10, 20 , 30) % using the agar wells diffusion method. Results showed that R. communis oil was more effecti
... Show MoreGas Chromatography GC, Gas Chromatography–Mass spectrometry GC/MS techniques used for analysis of the crude oils that taken from (10) producing wells in Nasiriyah oil field including (NS-1, NS-3, NS-4, NS-5, NS-6, NS-7, NS-8, NS-9, NS-10, and NS-12) from Mishrif reservoir . This reservoir is one of the important reservoirs in Al-Nasiriyah oil field, and it will be the main subject in the current study in order to provide information of crude oil analysis in this area, also to provide information on its characterizations. Mishrif Formation is one of the principle carbonate reservoir in central and southern Iraq. It is part of the wasia group and widespread throughout the Arabian gulf, It is deposited during Cenomanian-Early Turonian cyc
... Show MoreIn the present work, classification of radioactive wastes based on Annual Intake (AI) values is studied. Where the characterization of radionuclides was done by hand held GeLi detector with an overall efficiency better than 42%. It was noted the most predominant contaminant are Cs-137, Co-60 and Pa-234.The radioactive waste in disposal silo has been divided into five categories according to the harmful effect of radionuclides.For the purpose of storageradioactive wastein a safe manner, it wassuggesteda new method by shielding radioactive waste in each category with concrete;where the thickness of shielding is the time required to reduce the annual dose to 10%.
The orbital motion and longitude for some Jupiter's satellites (Amaletha, Europa, Ganymede and Callisto) were calculated from two different locations Iraq and Syria. A program was designed, the input parameters were the desired year, month, day and the longitude of the location, the output parameters results were applied in form of a file, and this file includes the longitude, orbital motion, and local time of these satellites. A specific date 1-10-2013 was taken, the results of longitude was (20-336) º and orbital motion was (92-331) º for both Iraq and Syria location with observing time (05:24:14-15:18:10) for Iraq and (04:56:33-14:50:30) for Syria. The difference in time between the two locations was constant (00:45:00), these resul
... Show MoreThis study was aimed to detect weather copA gene(copper resistance gene ) presence in A.baumannii A92 genome(AbaR genomic islands). The full genomic sequence of A.baumannii A92 not published in NCBI genome similarity was detected between two strains so the sequence of A.baumanniiIS-116(Genebank-AMGF0100000.1 ) was used to design the primers that were used for amplify of copA gene of A.baumannii A92.
Two primers contain two sites for restriction enzymes (KpnI,XohI) and PWSK29 vector were used in the cloning, double digestion has been performed for vector and gene. Then the re-ligation was completed to form recombinant molecule,after that, transformation have been performed for the recombinant molecule by using chemical competent E.coli
So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show MoreIn this work, we prove by employing mapping Cone that the sequence and the subsequence of the characteristic-zero are exact and subcomplex respectively in the case of partition (6,6,4) .
This paper presented the development and implementation of a steganographic method, the secret message is hidden in plain drawing (AutoCAD drawing) with vector coordinate used as stego cover. This paper focuses on trading a few least significant bits of original floating-point values and replacing them with a secret text. A secret text is implemented by transform each character in the text into numbers (using RSA algorithm), then stores it as part of floating-point numbers embedded with plain drawing. The main goal of steganography was fulfilled since changing plain drawing did not drown any suspicion; the same drawing can be used by experimental person and does not alter the original data content.
Metric type II bursts are formed from shocks driven by CME or flares which is
indicative of particles (SEPs) accelerated to high energies. This work aims to
investigate the metric type II bursts, CMEs and flare for twenty years (1996-2016,
inclusive) over two solar cycles 23 and 24. The total metric type II bursts was 1378
events divided into two groups: first group associated with CMEs regardless their
properties and this group has (1147) events. The second group associated with flares
which has (231) events. The interstice fraction of this research is the metric type II
associated with CME is 83% whereas only 17% with flare where this very close to
the previous study in 2005 which found 81% despite it was for on
The subject of biophysics is interdisciplinary and covers various fields of biology and physics. In this research the effect of some parameters of Nd:YAG laser on ants (Camponotus consobrinus) has been studied . This includes the effect on its external shape, as well as the percentage of the killing rate obtained. A laser radiation of a wavelength (1.064 µm) with different energies: (300, 320, 340, 360, 380 and 480 mJ) was used to irradiate ants placed at a distance of (10 cm) distance from the laser source . The irradiation times were (15 and 20 sec) for each energy. The obtained results showed an increase in the rate of ant mortality, as well
... Show MoreThe sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.
To investigate the antibacterial effects of Nigella sativa seed extracts, three different concentrations of this extract (100 mg/ml , 0.1mg/ml , and 0.0 mg/ml –control-) were prepared in, and tested against (12) S. aureus isolates, (6) S. epidermidis, (15) P. aeruginosa and (14) E. coli isolates, which were isolated from Suleiman Teaching Hospital. For each bacterium three nutrient broth culture tubes were prepared and (0.25ml) of the pre-mentioned concentrations (tested) and distilled water (control) were added to the three cultivated tubes respectively. The inhibitory effects of seed extracts for the first and second cultivated tubes were determined turbidometrically at (640 nm). The effects were proportional with the extract concent
... Show MoreSnowfall is one of the most important natural phenomena that can be seen in the
winter which is considered as a rare phenomenon in the Middle East. Snow is
covering parts of mountains in northern Iraq and neighboring countries in the first
months of the year. In this research, the snow cover can be detected and monitored
using pseudo color method, and the Normalized Difference Snow INDECES
(NDSI). Snow cover is difficult to detect in true color satellite images because the
white color of snow cover is the same color with the cloud cover. Modis sensors that
carried by Terra and Equa satellites images have been used in different bands and
different resolution and the case studied in 4/2/2017, 5/2/2017.