Preferred Language
Articles
/
04YIe4YBIXToZYALDYuW
Properties of engineered cementitious composite concrete (bendable concrete) produced using Portland limestone cement
...Show More Authors

Bendable concrete, also known as Engineered Cementitious Composite (ECC) is a type of ultra-ductile cementitious composites reinforced with fibres to control the width of cracks. It has the ability to enhance concrete flexibility by withstanding strains of 3% and higher. The properties of bendable concrete mixes (compressive strength, flexural strength, and drying shrinkage) are here assessed after the incorporation of supplementary cementitious materials, silica fume, polymer fibres, and the use of ordinary Portland cement (O.P.C) and Portland limestone cement (IL). Mixes with Portland limestone cement show lower drying shrinkage and lower compressive and flexural strength than mixes with ordinary Portland cement, due to the ratio of clinker existence being lower in the Portland limestone cement

Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Nonclassical Symmetry of Differential Equations
...Show More Authors

In this paper, we discuss the difference between classical and nonclassical symmetries. In addition, we found the non-classical symmetry of the Benjamin Bona Mahony Equation (BBM). Finally, we found a new exact solution to a Benjamin Bona Mahony Equation (BBM) using nonclassical symmetry.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Preparation of phenolic resin complexes
...Show More Authors

in this worl three types of complexed phenolic resins were prepared using various additives such as and improving the aim of this work higher mechanical properties this work is done

View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
The Act Of An Operator
...Show More Authors

In this paper we will study some of the properties of an operator by looking at the associated S-act of this operator, and conversely. We look at some operators, like one to one operators, onto operators. On the other hand, we look at some act theoretic concepts, like faithful acts, finitely generated acts, singular acts, separated acts, torsion free acts and noetherian acts. We try to determine what properties of T make the associated S-act has any of these properties.

View Publication Preview PDF
Crossref
Publication Date
Sun May 01 2016
Journal Name
Journal Of Craniofacial Surgery
Patterns of Pediatric Maxillofacial Injuries
...Show More Authors

Facial trauma in children and adolescents is reported to range from 1% to 30%. Because of many anatomical, physiological, and psychological characteristics of the pediatric population, maxillofacial injuries in children should be treated with special consideration that is attributable to certain features inherent in facial growth patterns of children. This study evaluated maxillofacial injuries in 726 children in terms of incidence, patterns of injury, causes, and treatment modalities and compared these parameters among 3 pediatric age groups. Intergroup differences were analyzed using Z test for 2 populations' proportion. The results showed that the incidence of pediatric maxillofacial injuries and fractures is higher than that reported el

... Show More
View Publication
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Space of Fuzzy Orderings
...Show More Authors

In this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group  (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of  (A). 2.  an element e  A such that (e) = – 1    X. 3. X :={a  A\ (a) = 1    X} = 1. 4. If f and g are forms over A and if x  D(

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Self-Regulation of University Students
...Show More Authors

The current research aims to identify the self-regulation of university students, as well as to identify the significance of the difference in self-regulation according to the variable of sex (male-female), specialization (scientific-human), and grade (first-fourth). To achieve the research objectives, the two researchers developed a scale of (28) items about self-regulation According to the theory of (Pandora, 1991). The scale was administered to (500) students from the first and fourth stages of Al -Mustansiriyah University who were selected based on the random stratification method for the 2020/2021 academic year. The results showed that university students have a good level of self-regulation. There are no significant differences in

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Sponsorship of widows in Islam
...Show More Authors

The research addressed the problem of widows that increased recently enormously. The researcher also referred to the perspective of Islam that gave a significant attention for both widows and orphans as powerless groups. Some straightforward example were presented to reflect the actual difficulties that encounter these groups as well as the author proposed number of appropriate ways that mitigate their psychological and physical sufferings such as: the provision of convenience jobs, and the legislation of rule that save their rights. Moreover, the researcher addressed the importance of marrying widows and what these challenges that encounter polygamy in Arab societies, the advantages and disadvantages of polygamy, and discussing all the

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Legal Sciences
Legal Protection of Computer Programs
...Show More Authors

Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties,

Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application.

This study comes to shed light on the legal na

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Diagnoses System of Varicose Disease
...Show More Authors

The diagnoses system of varicose disease has a good level of performance due to the complexity and uniqueness in patterns of vein of the leg. In addition, the patterns of vein are internal of the body, and its features are hard to duplicate, this reason make this method not easy to fake, and thus make it contains of a good features for varicose disease diagnoses. The proposed system used more than one type of algorithms to produce diagnoses system of varicose disease with high accuracy, in addition, this multi-algorithm technique based on veins as a factor to recognize varicose infection. The obtained results indicate that the design of varicose diagnoses system by applying multi- algorithms (Naïve Bayes and Back-Propagation) produced n

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF