In the last decades, using mineral admixture in concrete became very necessary to improve concrete properties and reduce CO2 emissions associated with the cement production process. Subsequently, more sustainable concrete can be obtained. Ternary blended cement containing two different types of mineral admixture can achieve ambitious steps in this trend. In this research, the synergic effects of mineral admixtures in ternary blended cement and its effects on concrete fresh properties, strength, durability, and efficiency factors of mineral admixture in ternary blended cement, were reviewed. The main conclusion reached after reviewing many literature pieces is that the concrete with ternary blended cement, depending on types of mineral admixtures used, replacement percentages by weight of cement, and age of concrete, exhibited superior properties than with no mineral admixtures and corresponding binary blended cement concrete.
Often requires the investor to know the result of the company's activity contribute to the investor or by wanting to invest in them because profit or loss of the company affect positively or negatively in the price of shares of the company and with the end of the fiscal year delayed companies often to issue its financial statements after it is approved and audited by an observer External Auditor, From here came the idea of research that appears to stakeholders of financial statements proactive appear, including actual figures for earlier stages have been prepared lists about lists and planned by the administration reflect the results of its phase remainder of the year as if they are (half a year or season or month) to offer At the
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The financial crises that occurred in South East Asia and America, and the discovery of the financial and administrative corruption that affected these companies, which led to the crisis. Since then, organizations and institutions interested in accounting have begun new ways to further rationalize the management of these companies. Hence the concept of governance, which means good governance. Al-Susiya confirmed its adoption of the financial reporting standards and adopted internal and external auditing for the purpose of increasing the reliability and credibility of the financial and reports that increase the confidence of investors in making their investment decisions in the financial markets The study dealt with the contributi
... Show MoreThe logistic regression model regarded as the important regression Models ,where of the most interesting subjects in recent studies due to taking character more advanced in the process of statistical analysis .
The ordinary estimating methods is failed in dealing with data that consist of the presence of outlier values and hence on the absence of such that have undesirable effect on the result. &nbs
... Show MoreAbstract This study explores the extent to which public relations (PR) departments within Traqj governmental institutions are integrating artificial intelligence (AI) applications into their communication activities. The research adresses the growing importanc of AI in enhancing administrative efficieney, communication transparency, and stakeholder engagement. Adopting a descriptive research design, the study relied on an electtonic questionnaire distributed to PR profesionals across various ministries and government bodies, collecting 100 valid responses. The indings reveal that while younger PR practitioners are actively embracing AI, older employees show limited engagement. Most participants acquired AI-related skills through self- learn
... Show MoreBackground: Although expression of the HER-
2/neuoncogene may be of some prognostic importance
in advanced ovarian cancer, its role in early-stage
disease has not been established. The current study
examined the prevalence and significance of HER-
2/neu expression in different grades of different types
of surface epithelial ovarian carcinoma.
Methods: Thirty eight female patients with surface
epithelial ovarian cancer were included in this study.
The blocks of corresponding formalin fixed, paraffinembedded
ovarian biopsies were retrieved from the
archives and hematoxylin-eosin slides of each ovarian
biopsy were reviewed and marked their grades of
differentiation , then a new sections from each sampl
Abstract:
The research sought to identify the crises that occurred during the research period and their reflection on the performance of the hotel Research sample as well as to identify the reality of auditing the hotel Research sample and the preparation of a performance audit program can be adopted in auditing the performance of hotels in light of crises, and the problem of the research lies in the lack of a program to audit the performance of hotels that takes into account the crises experienced by the hotel sector, The research was based on solving its problems on three hypotheses, the first is that the performance audit in light of the Covid-19 pand
... Show More