Preferred Language
Articles
/
joe-1425
Influence of Using Various Percentages of Slag on Mechanical Properties of Fly Ash-based Geopolymer Concrete
...Show More Authors

In order to implement the concept of sustainability in the field of construction, it is necessary to find an alternative to the materials that cause pollution by manufacturing, the most important of which is cement. Because factory wastes provide siliceous and aluminous materials and contain calcium such as fly ash and slag that are used in the production of high-strength geopolymer concrete with specifications similar to ordinary concrete, it was necessary for developing this type of concrete that is helping to reduce CO2 (dioxide carbon) in the atmosphere. Therefore, the aim of this study was to study the influence of incorporating various percentages of slag as a replacement for fly ash and the effect of slag on mechanical properties. This paper showed the details of the experimental work that has been undertaken to search and make tests the strength of geopolymer mixtures made of fly ash and then replaced fly ash with slag in different percentages. The geopolymer mixes were prepared using a ground granulated blast-furnace slag (GGBFS) blend and low calcium fly ash class F activated by an alkaline solution. The mixture compositions of fly ash to slag were (0.75:0.25, 0.65:0.35, 0.55:0.45) by weight of cementitious materials respectively and compared with reference mix of conventional concrete with mix proportion 1:1.5:3 (cement: sand: coarse agg.), respectively. The copper fiber was used as recycled material from electricity devices wastes such as (machines, motors, wires, and electronic devices) to enhance the mechanical properties of geopolymer concrete. The heat curing system at 40 oC temperature was used. The results revealed that the mix proportion of 0.45 blast furnace slag and 0.55 fly ash produced the best strength results. It also showed that this mix ratio could provide a solution for the need for heat curing for fly ash-based geopolymer.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 01 2024
Journal Name
Egyptian Journal Of Veterinary Sciences
Contamination with Proteus and Staphylococcus spp. Effect on Physical Properties of Sheep Semen
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Agriculture And Biology
Dietary Replacement with Food Waste and Black Soldier Fly Larvae Supplementation Improved Growth Performance, Nutrient Digestibility and Intestinal Microbial Population in Broilers
...Show More Authors

This study was aimed to evaluate the effect of conventional ingredients replacement with alternative ingredients on growth performance, carcass quality, nutrient digestibility and intestinal microbial of broilers. One hundred twenty Cobb500 broiler chicks were randomly assigned to four diets. Corn, soybean meal and fish meal were replaced with rice waste, meat and bone waste and black soldier fly larvae (BSFL) at 0, 10, 30 and 50% to form four treatments. Body weight gain, feed conversion ratio and digestibility of crude protein and fat were improved in broilers fed the replacement diets. Feed intake was not affected by the treatments suggesting that the replacement diets were well accepted by the chicken. Escherichia coli was decre

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
Influence of Vitamin D Deficiency on the Level of Salivary cathelicidin LL-37 in relation to Dental Caries Experience: A Case-Control Study
...Show More Authors

Background: Vitamin D improves innate immunity by enhancing the expression of antimicrobial peptides. The antimicrobial action of cathelicidin is widespread and effective against cariogenic bacteria. This research aimed to investigate the effect of vitamin D deficiency on the level of salivary cathelicidin concerning dental caries experience.

Subjects and Methods: A case-control study was carried out, and the sample was composed of 80 females; the study group involved 40 females with a serum vitamin D concentration of less than 10 ng/ml. In addition to the control group involving 40 females wh

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Mar 29 2024
Journal Name
Iraqi Journal Of Science
Kinematic Properties of the Gaseous Stellar Dynamics Using the Tully-Fisher Relation in the Different Types of Spiral Galaxies
...Show More Authors

     The goal of this paper is to show the kinematic characteristics of gaseous stellar dynamics using scaling coefficient relationships (such as Tully-Fisher) in different spiral galaxies. We selected a sample of types of spiral morphology  (116 early, 150 intermediate, and 146 late) from previous literature work, and used statistical software (statistic-win-program) to find out the associations of multiple factors under investigation, such as the main kinematic properties of the gaseous-stellar (mass, luminosity, rotational speed, and baryons) in different types of spiral galaxies. We concluded that there is a robust positive connection between Log Vrot.max.) and Log Mstar(B-V), as well as between Log Vrot.max. and Log Mbar (

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Retrofitting of Reinforced Concrete Damaged Short Column Exposed to High Temperature
...Show More Authors

Experimental research was carried out to investigate the performance of CFRP wrapping jackets used for retrofitting twelve square reinforced concrete (CR) column specimens damaged by exposure to fire flame, at different temperatures of  300, 500 and 700ºC, except for two specimens that were not burned. The specimens were then loaded axially till failure after gradual or sudden cooling. The specimens were divided into two groups containing two main reinforcement ratios, ρ= 0.0314 and ρ= 0.0542. This was followed by the retrofitting procedure that included wrapping all the specimens with two layers of CFRP fabric sheets. The test results of the retrofitted specimens showed that the fire damaged RC

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2006
Journal Name
Tikrit Journal Of Engineering Sciences
Curvature Ductility of Reinforced Concrete Column Sections Under Different strain Rates
...Show More Authors

This paper presents theoretical parametric study of the curvature ductility capacity for reinforced concrete column sections. The study considers the behavior of concrete and reinforcing steel under different strain rates. A computer program has been written to compute the curvature ductility taking into account the spalling in concrete cover. Strain rate sensitive constitutive models of steel and concrete were used for predicting the moment-curvature relationship of reinforced concrete columns at different rate of straining. The study parameters are the yield strength of main reinforcement, yield strength of transverse reinforcement, compressive strength of concrete, spacing of ties and the axial load. The results indicated that hi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref