Self-compacting concrete (SCC) is an innovative concrete that does not require vibration for placing and compaction. It is able to flow under its own weight, completely filling formwork and achieving full compaction, even in the presence of congested reinforcement. The effect of external sulfate attack was studied-Es (very sever exposure SO4>10000ppm) according to ACI 318-11. The mix design method of SCC used is according to EFNARC 2002, and then must satisfy the criteria of filling ability, passing ability and segregation resistance. The experimental program focuses to study two different chemical composition of sulfate resistance Portland cement with different percentage of silica fume replacement by weight of cement and W/cm (0.3 and 0.35). The SCC mixes with cement type 1(C3S= 46.39 and C3S/C2S = 1.78) shows more resistance to Es than mixes with cement type 2 (C3S= 61.22 and C3S/C2S =4.44). The SCC mixes containing 10% SF as replacement of cement shows more resistance to external sulfate attack. The percentage of increase is 17.95% for SCC mixes with type 1 cement and W/cm =0.3 and 17.88% for SCC mixes with type 2 cement and W/cm =0.3 compared to reference concrete mixes
In this study, two types of mixes were adopted by using two grading of coarse aggregate. The practical side of this study was to produce no-fine aggregate concrete by using crushed clay brick aggregates. The durability of the produced concrete and internal sulfate attack was studied. For durability assessment, it is found that the no-fine concrete made with crushed brick aggregate lost about (15-25) % of its compressive strength after being subjected to 60 cycles of wetting and drying with age 120 days. The curing condition showed that the water curing improved the compressive strength with a rate higher than that when sealed or air dry curing were used. The crushed brick no-fine concrete de
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIn this research, an experimental study was conducted to high light the impact of the exterior shape of a cylindrical body on the forced and free convection heat transfer coefficients when the body is hold in the entrance of an air duct. The impact of changing the body location within the air duct and the air speed are also demonstrated. The cylinders were manufactured with circular, triangular and square sections of copper for its high thermal conductivity with appropriate dimensions, while maintaining the surface area of all shapes to be the same. Each cylinder was heated to a certain temperature and put inside the duct at certain locations. The temperature of the cylinder was then monitored. The heat transfer coefficient were then cal
... Show MoreThe study aims at showing the active role of the internal auditors through explaining what they should be obliged to in writing the reports and financial and non financial statements according to the international standards of accounting to be transparent and integral. It also aims at giving the independence that the auditors should enjoy through connecting them to an Auditing Commissions to submit additional services in addition to assessing the instrument of control to evaluate risks, give consultations and the services related to the governance and independence of Supervising Council.
... Show MoreThis work was included external morphological study of male Black veined white butterfly Aporiacrataegi L. 1758. The study involved morphological characters of many body regions, in addition the male genitalia. This morphological characters study supported by illustrations, it should be noted the work specimens were collected from northern Iraq.
The research aims to evaluate Evaluation of the investments Iraqi fund for External development through the application of financial tools to a number of companies of the Iraqi Fund for External Development, and from the point of view to achieve the best returns from investment and the feasibility of the investments of the Iraqi Fund for External Development and the research community represents the Iraqi Fund for External Development and the amount of (28) A company, while the research sample is (4) companies (the Arab Petroleum Transportation Services Company, the Arab Iraqi Company for Livestock Development, the Bauhaus Company for prefabricated buildings and mineral installations, the Arab Fisheries Company) that were chosen
... Show MoreKE Sharquie, AA Noaimi, SD Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 15
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.