In this research work, a new type of concrete based on sulfur-melamine modification was introduced, and its various properties were studied. This new type of concrete was prepared based on the sulfur-melamine modification and various ingredients. The new sulfur-melamine modifier was fabricated, and its fabrication was confirmed by IR spectroscopy and TG analysis. The surface morphology resulted from this modifier was studied by SEM and EDS analysis. The components ratios in concrete, chemical and physical characteristics resulted from sulfur-melamine modifier, chemical and corrosion resistance of concrete, stability of concrete against water adsorption, stability of concrete against freezing, physical and mechanical properties and durability, modulus of elasticity, and thermal expansion coefficient of the studied sulfur concrete were investigated. The IR results confirmed the amino functional groups (attached melamine ring) and the formation of polymer sulfur chains. The sulfur-melamine modification thermic mass loss was one step. The mass loss processes of the modifier were endothermic processes. The obtained SEM results revealed that the sulfur-melamine modifier had a more porous structure, without any crystal forms. EDS analysis showed that the nitrogen atoms were accounted for 51.33% of total mass while the carbon was 30.94% of total mass. The stability of sulfur-melamine modifier-based concrete was very high in the various aggressive solutions. The low size of aggregates-based concrete had more density, i.e., 2417 kg\m3. The concrete density was decreased slowly with increase in the size of aggregate. The average deformation of studied concrete was (0.0030-0.0033), confirming that the deformation performance of concrete was better than the traditional concretes. The obtained results also confirmed that value of thermal expansion coefficient for sulfur-melamine modified concrete was 17.2×10-6\˚C.
Background: Type two diabetic patients have higher risk of cardiovascular and periodontal disease. Furthermore, patients with more severe periodontal disease have higher incidence of cardiovascular disease. This study aimed to assess the association between periodontal health status and the risk of vascular disease in type 2 diabetic patients. Materials and Methods: One hundred type 2 diabetes mellitus patients and fifty apparently healthy males were enrolled in this study. Oral examinations conducted were; plaque Index, calculus index, gingival index, probing pocket depth, and clinical attachment level. For the assessment of vascular risk, arterial stiffness index was used. Results: According to arterial stiffness index, type 2 diabetic p
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show MoreSocial media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show MoreA robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe action of high repeated trucks load associated with dramatically elevated ambient temperatures leads to the most harmful distress in asphalt pavements occurred in Iraq known as rutting. Essentially, it is produced from the accumulation of irrecoverable strains, which mainly occurred in the asphalt layers. That visually demonstrated as a longitudinal depression in the wheel paths as well as small upheavals to the sides. Poly Phosphoric Acid (PPA) has been used as a means of producing modified asphalt binders and the interest to use it has increased in recent years. The PPA provides modified asphalt binder, which is relatively cheaply produced compared to polymer-modified asphalt. In this paper, PPA was used by three-percentages 1
... Show MoreIn this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those
... Show MoreIn this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show More