Bendable concrete, also known as Engineered Cementitious Composite (ECC) is a type of ultra-ductile cementitious composites reinforced with fibres to control the width of cracks. It has the ability to enhance concrete flexibility by withstanding strains of 3% and higher. The properties of bendable concrete mixes (compressive strength, flexural strength, and drying shrinkage) are here assessed after the incorporation of supplementary cementitious materials, silica fume, polymer fibres, and the use of ordinary Portland cement (O.P.C) and Portland limestone cement (IL). Mixes with Portland limestone cement show lower drying shrinkage and lower compressive and flexural strength than mixes with ordinary Portland cement, due to the ratio of clinker existence being lower in the Portland limestone cement
The effect of different antibiotics on growth pigment and plasmid curing of Serratia marcescens were studied, S. marcescens was cultured in media containing(16_500)µg/ml of antibiotics, curing mutants unable to produce prodigiosin and lost one plasmid band were obtained of of ampicillin, amoxillin, antibiotics concentrations (64 500) µg/ml metheprim, ultracloxam, azithromycin, cephalexin and erythromycin treated with (350 500) µg/ml of The mutant cells rose- light color and and refampicin revealed S.marcescens inhibited ciprodar and tetracyclin, lincomycin did not lost the plasmid band chlaforan
Corrosion- induced damage in reinforced concrete structure such as bridges, parking garages, and buildings, and the related cost for maintaining them in a serviceable condition, is a source of major concern for the owners of these structures.
Fly ash produced from south Baghdad power plant with different concentrations (20, 25 and 30) % by weight from the cement ratio were used as a corrosion inhibitor as a weight ratio from the cement content.
The concrete batch ratio under study was (1:1.5:3) cement, sand and gravel respectively which is used in Iraq. All the raw materials used were locally manufactured.
Concrete slabs (250x250x70) mm dimensions were casted, using Poly-wood molds. Two steel bars were embedded in the central po
E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MoreEffluent from incompetent wastewater treatment plants (WWTPs) contains a great variety of pollutants so support water treatments are essential. The present work studies the removal of phosphate species from aqueous solutions by adsorption on to spherical Calcined Sand -Clay mixture (CSCM) used a natural, local and low-cost adsorbent. Batch experiments were performed to estimate removal efficiency of phosphate. The adsorption experiments were carried out as function of pH, dose of adsorbent, initial concentration, temperature and time of adsorption. The efficient removal was accomplished for pH between 10 and 12. The experimental results also showed that the removal of phosphate by (CSCM) was rapid (the % removal 98.9%, 92%, 90%, 89% in 6
... Show MoreLongitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreUrinary stones are one of the most common painful disorders of the urinary system. Four new technologies have transformed the treatment of urinary stones: Electrohydraulic lithotripsy, ultrasonic lithotripsy, extracorporeal shock wave lithotripsy, and laser lithotripsy.The purpose of this study is to determine whether pulsed holmium laser energy is an effective method for fragmenting urinary tract stones in vitro, and to determine whether stone composition affects the efficacy of holmium laser lithotripsy. Human urinary stones of known composition with different sizes, shapes and colors were used for this study. The weight and the size of each stone were measured. The surgical laser system which used in our study is Ho:YAG laser(2100nm)
... Show More