In this research work, a new type of concrete based on sulfur-melamine modification was introduced, and its various properties were studied. This new type of concrete was prepared based on the sulfur-melamine modification and various ingredients. The new sulfur-melamine modifier was fabricated, and its fabrication was confirmed by IR spectroscopy and TG analysis. The surface morphology resulted from this modifier was studied by SEM and EDS analysis. The components ratios in concrete, chemical and physical characteristics resulted from sulfur-melamine modifier, chemical and corrosion resistance of concrete, stability of concrete against water adsorption, stability of concrete against freezing, physical and mechanical properties and durability, modulus of elasticity, and thermal expansion coefficient of the studied sulfur concrete were investigated. The IR results confirmed the amino functional groups (attached melamine ring) and the formation of polymer sulfur chains. The sulfur-melamine modification thermic mass loss was one step. The mass loss processes of the modifier were endothermic processes. The obtained SEM results revealed that the sulfur-melamine modifier had a more porous structure, without any crystal forms. EDS analysis showed that the nitrogen atoms were accounted for 51.33% of total mass while the carbon was 30.94% of total mass. The stability of sulfur-melamine modifier-based concrete was very high in the various aggressive solutions. The low size of aggregates-based concrete had more density, i.e., 2417 kg\m3. The concrete density was decreased slowly with increase in the size of aggregate. The average deformation of studied concrete was (0.0030-0.0033), confirming that the deformation performance of concrete was better than the traditional concretes. The obtained results also confirmed that value of thermal expansion coefficient for sulfur-melamine modified concrete was 17.2×10-6\˚C.
Linear and mass attenuation coefficient of reactive powder concrete (RPC) sample ( of compressive strength equal to 70 Mpa) using beta particles and gamma ray with different energies have been calculated as a function of the absorber thickness and energy. The attenuation coefficient were obtained using NaI(Tl) energy selective scintillation counter with 90Sr/90Y beta source having an energy rang from (0.546-2.274) MeV and gamma ray energies (0.569, 0.662, 1.063, 1.17 and 1.33) MeV . The attenuation coefficient usually depends upon the energy of radiations and nature of the material. The result represented in graphical forms. Exponential decay was observed. It is found that the capability of reactive powder concrete to absorber beta particle
... Show MoreAufhebung gesellschaftlicher,geistiger und ischer Schranken durch die Aufklarung
Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreIn this effort, we define a new class of fractional analytic functions containing functional parameters in the open unit disk. By employing this class, we introduce two types of fractional operators, differential and integral. The fractional differential operator is considered to be in the sense of Ruscheweyh differential operator, while the fractional integral operator is in the sense of Noor integral. The boundedness and compactness in a complex Banach space are discussed. Other studies are illustrated in the sequel.
A novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and in
... Show MoreA new nano-sized NiMo/TiO2-γ-Al2O3 was prepared as a Hydrodesulphurization catalyst for Iraqi gas oil with sulfur content of 8980 ppm, supplied from Al-Dura Refinery. Sol-gel method was used to prepare TiO2- γ-Al2O3 nano catalyst support with 64% TiO2, 32% Al2O3, Ni-Mo/TiO-γ-Al2O3 catalyst was prepared under vacuum impregnation conditions to loading metals with percentage 3.8 wt.% and 14 wt.% for nickel and molybdenum respectively while the percentage for alumina, and titanium became 21.7, and 58.61 respectively. The synthesized TiO2- γ-Al2O3 nanocomposites and Ni-Mo /TiO2
... Show MoreOne of the most common metabolic illnesses in the world is diabetes mellitus. This metabolic disease is responsible for a large percentage of the burden of kidney damage and dysfunction. The goal of this study was to look into the renal function of diabetic patients using metformin monotherapy who came to Mosul's Al-Wafaa diabetes care and research facility. During the period 1 January 2021 to 30 April 2021, 47 patients with T2DM (age 50.48 7.74 years) were enrolled in this case-control study. These patients' results were compared to a control group of 47 seemingly healthy people (age 45.89 9.06 years). All participants' demographic and medical histories were acquired through the delivery of a questionnaire. Blood samples were collected
... Show MoreThis study investigated the structural behavior of a beam–slab member fabricated using a steel C-Purlins beam carrying a profile steel sheet slab covered by a dry board sheet filled with recycled aggregate concrete, called a CBPDS member. This concept was developed to reduce the cost and self-weight of the composite beam–slab system; it replaces the hot-rolled steel I-beam with a steel C-Purlins section, which is easier to fabricate and weighs less. For this purpose, six full-scale CBPDS specimens were tested under four-point static bending. This study investigated the effect of using double C-Purlins beams face-to-face as connected or separated sections and the effect of using concrete material that contains different recycled
... Show MoreMost reinforced concrete (RC) structures are constructed with square/rectangular columns. The cross-section size of these types of columns is much larger than the thickness of their partitions. Therefore, parts of these columns are protruded out of the partitions. The emergence of columns edges out of the walls has some disadvantages. This limitation is difficult to be overcome with square or rectangular columns. To solve this problem, new types of RC columns called specially shaped reinforced concrete (SSRC) columns have been used as hidden columns. Besides, the use of SSRC columns provides many structural and architectural advantages as compared with rectangular columns. Therefore, this study was conducted to explain the structura
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the