This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PVC composite exhibit the optimum values compared to UP/PET composite in all properties under test. From the experimental results, it can be concluded that the prepared composites from the waste could be utilized as precast or partitions inside the buildings with improved mechanical properties
The study aims to demonstrate the significance of metaverse technology across various disciplines, academic degrees, scientific fields, and academic titles. It also aims to assess the level of knowledge and understanding of university teachers (research sample) regarding metaverse technology. Hence, the descriptive research methodology was based on the method of statistical survey in the sample. It involved a set of organized scientific steps to deduce data from the reality of the statistical sample and its nature in order to achieve the objectives of the study. In this study, a questionnaire was used as a tool to collect data from a random sample of approximately 121 teachers and instructors from the University of Baghdad. This app
... Show MoreThe need for detection and investigation of the causes of pollution of the marshes and submit a statistical study evaluated accurately and submitted to the competent authorities and to achieve this goal was used to analyze the factorial analysis and then obtained the results from this analysis from a sample selected from marsh water pollutants which they were: (Electrical Conductivity: EC, Power of Hydrogen: PH, Temperature: T, Turbidity: TU, Total Dissolved Solids: TDS, Dissolved Oxygen: DO). The size of sample (44) sites has been withdrawn and examined in the laboratories of the Iraqi Ministry of Environment. By illustrating SPSS program) the results had been obtained. The most important recommendation was to increase the pumping of addit
... Show MoreAbstract
This study aims to identify the degree to which the first cycle teachers use different feedback patterns in the E-learning system, to identify the differences in the degree of use according to specialization, teaching experience, and in-service training in the field of classroom assessment as well as the interaction between them. The study sample consisted of (350) female teachers of the first cycle in the governmental schools in Muscat Governorate for the academic year 2020/2021. The study used a questionnaire containing four different feedback patterns: reinforcement, informative, corrective, and interpretive feedback. The psychometric properties of the questionnaire were verified in terms of validity
... Show MoreThe number of infections caused by microorganisms is increasing significantly over the last few years. A total of 140 patients admitted to the central teaching hospital of pediatrics from the 1st of Jun 2017 to 31 October 2017. The Clinical samples was processed from culture and sensitivity testing. Antibiotic discs used for gram negative isolates. The most prevalent gram negative isolates included Escherichia coli 63 (45.0 %), Pseudomonas spp. 21 (15.0 %), Klebsiella spp. 19 (13.6 %) predominantly. Escherichia coli were the most prevalent isolates from urine 45 (71.4 %), Klebsiella spp. 11 (57.9 %) and Enterobacter spp. 11 (68.8 %) followed by Escherichia coli 10 (15.9 %) predominant from blood. 68 (48.6 %) of specimens were urine, 47 (33.
... Show MoreAbstract The wavelet shrink estimator is an attractive technique when estimating the nonparametric regression functions, but it is very sensitive in the case of a correlation in errors. In this research, a polynomial model of low degree was used for the purpose of addressing the boundary problem in the wavelet reduction in addition to using flexible threshold values in the case of Correlation in errors as it deals with those transactions at each level separately, unlike the comprehensive threshold values that deal with all levels simultaneously, as (Visushrink) methods, (False Discovery Rate) method, (Improvement Thresholding) and (Sureshrink method), as the study was conducted on real monthly data represented in the rates of theft crimes f
... Show More
The research aims to measure, assess and evaluate the efficiency of the directorates of Anbar Municipalities by using the Data Envelopment Analysis method (DEA). This is because the municipality sector is consider an important sector and has a direct contact with the citizen’s life. Provides essential services to citizens. The researcher used a case study method, and the sources of information collection based on data were monthly reports, the research population is represented by the Directorate of Anbar Municipalities, and the research sample consists of 7 municipalities which are different in terms of category and size of different types. The most important conclusion reached by the research i
... Show MoreBackground: This study evaluate the immunohistochemical expression profile of transforming growth factor beta-1 in inflamed gingival tissue of patients with gingivitis and chronic periodontitis compared to healthy subjects and, determine the correlation between this cytokine and the clinical periodontal parameters, intensity of inflammation and chronic periodontitis severity. Materials and methods: Gingival tissue specimens were taken from 23 chronic periodontitis patients, 20 gingivitis patients and 20 periodontally healthy subjects. The periodontal status was evaluated by dichotomous measurements of the clinical periodontal parameters (PLI, GI, BOP, PPD, CAL). The gingival specimens were fixed immediately in 10% formalin and processed ro
... Show MoreObjective: The present study was aimed to develop a pH-triggered in situ gel for local release of lidocaine hydrochloride (lidocaine HCL) in the buccal cavity to improve the anesthetic effect of this amino amide drug which has very high water solubility. The formulations were introduced to the oral cavity as a spray to improve compliance and for easier administration.Methods: In this work, two grades of carbopol (934 and 940)-based in situ gel spray were designed. The formulations containing lidocaine HCl 5% were prepared by mixing different concentrations of carbopol with xanthan gum. Eight formulations were investigated and evaluated for gelation capacity, spray angle, volume of solution delivered per each actuation, rheological p
... Show MoreA research was conducted to determine the feasibility of using adsorption process to remove boron from aqueous solutions using batch technique. Three adsorbent materials; magnesium, aluminum and iron oxide were investigated to find their abilities for boron removal. The effects of operational parameters on boron removal efficiency for each material were determined.
The experimental results revealed that maximum boron removal was achieved at pH 9.5 for magnesium oxide and 8 for aluminum and iron oxide. The percentage of boron adsorbed onto magnesium,aluminum and iron oxide reaches up to 90, 42.5 and 41.5% respectively under appropriate conditions. Boron concentration in effluent water after adsorption via magnesium oxide comply with th
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More