One of the artificial lightweight aggregates with a wide range of applications is Lightweight Expanded Clay Aggregate. Clay is utilized in the production of light aggregates. Using leftover clay from significant infrastructure development projects to manufacture lightweight aggregates has a favorable environmental impact. This research examines the expanded clay aggregate production process and the impact of processing parameters on its physical and mechanical qualities. It also looks at secondary components that can be used to improve the qualities of concrete with expanded clay aggregates. The effect of the quantity of expanded clay aggregate on the fresh, hardened, and durability qualities of concrete is also studied. Expanded clay aggregates improve workability, fire resistance, sound insulation, and thermal insulation in concrete. Its inclusion, on the other hand, diminishes concrete's density, strength, elastic modulus, and resistance to freeze-thaw action.
Background: Tooth wear is one of the most concerning problems of the current dental practice especially among older subjects. The aim of this study is to determine the severity of tooth wear and its relation with selected salivary variables (salivary pH and vitamin C level) among a group of older adults in Mosul city/Iraq. Materials and methods: All subjects (30 subjects) of both gender tookpart in the current study; sixteen of them were older adults (55-65 years) and compared with fourteen middle-aged adults (30-40 years) at Textile factory in Mosul city/Iraq. Unstimulated salivary samples were collected and salivary pH was immediately measured. Salivary vitamin C level was determined colormetrically. Severity of tooth wear was determined
... Show MoreSimulation of free convection heat transfer in a square enclosure induced by heated thin plate is represented numerically. All the enclosure walls have constant temperature lower than the plate’s temperature. The flow is assumed to be two-dimensional. The discretized equations were solved stream function, vorticity, and energy equations by finite difference method using explicit technique and Successive Over- Relaxation method. The study was performed for different values of Rayleigh number ranging from 103 to 105 for different angle position of heated thin plate(0°, 45°, 90°). Air was chosen as a working fluid (Pr = 0.71). Aspect ratio of center of plate to the parallel left wall A2
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
The latest events in Iraq and notably the fall of Mosul in the summer of 2014 have marked a turning point in The modern history of Iraq. Violent terrorist groups have overrun a vast area comprising of many towns in mid and northern Iraq causing many casualties and mass migration. Despite Iraq’s long history of pain and suffering the events of the second half of the year 2014 have been the most violent ever witnessed. From this point of view the researcher has tried to identify specifically in this time and place the effect these events have had on the Iraqi artist and to understand how the Iraqi artists depicted this violence in their works of art. The research comprises four parts; the first looked at the language used and the and pro
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreDepp and Heard's trial has reaped significant attention due to the domestic violence allegations directed towards each other. This paper sheds light on the repressed narrative beyond the mere words spoken aloud. It delves into an overlooked aspect, i.e., nonverbal communication. Previous studies focused on one or two categories of nonverbal communication. Therefore, the current study investigates the types and sub-types of nonverbal communication exhibited by both rivals within the courtroom setting. To examine the credibility and repressibility of nonverbal communication, the researchers have carefully watched (28) videos representing the whole trial's event. Some nonverbal communication was traced through the whole (28) videos fro
... Show MoreIn this study, ultraviolet (UV), ozone techniques with hydrogen peroxide oxidant were used to treat the wastewater which is produced from South Baghdad Power Station using lab-scale system. From UV-H2O2 experiments, it was shown that the optimum exposure time was 80 min. At this time, the highest removal percentages of oil, COD, and TOC were 84.69 %, 56.33 % and 50 % respectively. Effect of pH on the contaminants removing was studied in the range of (2-12). The best oil, COD, and TOC removal percentages (69.38 %, 70 % and 52 %) using H2O2/UV were at pH=12. H2O2/ozone experiments exhibited better performance compared to
... Show More