Corrosion- induced damage in reinforced concrete structure such as bridges, parking garages, and buildings, and the related cost for maintaining them in a serviceable condition, is a source of major concern for the owners of these structures.
Fly ash produced from south Baghdad power plant with different concentrations (20, 25 and 30) % by weight from the cement ratio were used as a corrosion inhibitor as a weight ratio from the cement content.
The concrete batch ratio under study was (1:1.5:3) cement, sand and gravel respectively which is used in Iraq. All the raw materials used were locally manufactured.
Concrete slabs (250x250x70) mm dimensions were casted, using Poly-wood molds. Two steel bars were embedded in the central position of each slab at the mid- height (about 35 mm), with a space of 100 mm between each other.
A 16 concrete slabs were prepared (0, 20, 25 and 30) wt. % of fly ash. The specimens were partially immersed in 3.5 wt. % NaCl solution in order to predict the corrosion.
Half-cell potential test technique was used to estimate the corrosion rate which is occurred in the steel bar due to the migration of chloride ions through the concrete, depending on the ASTM C876-08.
The result shows that the potential values of steel in concrete were shifts to the positive direction with increasing the percentage of fly ash, because the reduction of porosity by the addition of fly ash which fill the pores and inhibit the chloride ions to reach to steel.
The results also show that the further increase of fly ash (30%) the possibility of carbonation is increased which result in reduction its alkalinity, thereby permitting corrosion of embedded steel.
With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show Morehe assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreIn the absence of environmental regulation, food stays to be contaminated with heavy metals, which is becoming a big worry for human health. The present research focusses on the environmental and health effects of irrigating a number of crops grown in the soils surrounding the Al-Rustamia old plant using treated wastewater generated by the plant. The physicochemical properties, alkalinity, and electrical conductivity of the samples were evaluated, and vegetable samples were tested for Cd, Pb, Ni, and Zn, levels, and even the transfer factor (TF) from soils to crops and crop and multi-targeted risk, daily intake (DIM) of metals, and health risk index (HRI) was calculated. The findings found that the average contents of Zn, Pb, Ni, an
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreDecision making is vital and important activity in field operations research ,engineering ,administration science and economic science with any industrial or service company or organization because the core of management process as well as improve him performance . The research includes decision making process when the objective function is fraction function and solve models fraction programming by using some fraction programming methods and using goal programming method aid programming ( win QSB )and the results explain the effect use the goal programming method in decision making process when the objective function is
fraction .
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The Assignment model is a mathematical model that aims to express a real problem facing factories and companies which is characterized by the guarantee of its activity in order to make the appropriate decision to get the best allocation of machines or jobs or workers on machines in order to increase efficiency or profits to the highest possible level or reduce costs or time To the extent possible, and in this research has been using the method of labeling to solve the problem of the fuzzy assignment of real data has been approved by the tire factory Diwaniya, where the data included two factors are the factors of efficiency and cost, and was solved manually by a number of iterations until reaching the optimization solution,
... Show More