The reinforced fiberglass in cement slurry reflects the effect on its properties compared to usual additives. Fiberglass is typically used in cement slurry design for one or another of the following goals: (Earth earthquake, bearing storage, and with differential stresses, to enhance cement durability and increase its compressive strength). The main goal is to use glass fiber and ground fiberglass to improve the tensile strength and moderate compressive strength significantly. On the other hand, the use of glass fibers led to a slight increase in the value of thickening time, which is a desirable effect. Eleven glass fiber samples and milled glass fiber were used to show these materials' effect on Iraqi cement with (0.125, 0.25, 0.5
... Show MoreUnmanned aerial vehicles (UAVs) can provide valuable spatial information products for many projects across a wide range of applications. One of the major challenges in this discipline is the quality of positioning accuracy of the resulting mapping products in professional photogrammetric projects. This is especially true when using low-cost UAV systems equipped with GNSS receivers for navigation. In this study, the influence of UAV flight direction and camera orientation on positioning accuracy in an urban area on the west bank of the Euphrates river in Iraq was investigated. Positioning accuracy was tested in this study with different flight directions and camera orientation settings using a UAV autopilot app (Pix4Dcapture software
... Show MoreThe influence of the reaction gas composition during the DC magnetron sputtering process on the structural, chemical and optical properties of Ce-oxide thin films was investigated. X-ray diffraction (XRD) studies confirmed that all thin films exhibited a polycrystalline character with cubic fluorite structure for cerium dioxide. X-ray photoelectron spectroscopy (XPS) analyses revealed that cerium is present in two oxidation states, namely as CeO2 and Ce2O3, at the surface of the films prepared at oxygen/argon flow ratios between 0% and 7%, whereas the films are completely oxidized into CeO2 as the aforementioned ratio increases beyond 14%. Various optical parameters for the thin films (including an optical band gap in the range of 2.25–3.
... Show MoreA skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show More