Bendable concrete, also known as Engineered Cementitious Composite (ECC) is a type of ultra-ductile cementitious composites reinforced with fibres to control the width of cracks. It has the ability to enhance concrete flexibility by withstanding strains of 3% and higher. The properties of bendable concrete mixes (compressive strength, flexural strength, and drying shrinkage) are here assessed after the incorporation of supplementary cementitious materials, silica fume, polymer fibres, and the use of ordinary Portland cement (O.P.C) and Portland limestone cement (IL). Mixes with Portland limestone cement show lower drying shrinkage and lower compressive and flexural strength than mixes with ordinary Portland cement, due to the ratio of clinker existence being lower in the Portland limestone cement
In this paper, we discuss the difference between classical and nonclassical symmetries. In addition, we found the non-classical symmetry of the Benjamin Bona Mahony Equation (BBM). Finally, we found a new exact solution to a Benjamin Bona Mahony Equation (BBM) using nonclassical symmetry.
in this worl three types of complexed phenolic resins were prepared using various additives such as and improving the aim of this work higher mechanical properties this work is done
In this paper we will study some of the properties of an operator by looking at the associated S-act of this operator, and conversely. We look at some operators, like one to one operators, onto operators. On the other hand, we look at some act theoretic concepts, like faithful acts, finitely generated acts, singular acts, separated acts, torsion free acts and noetherian acts. We try to determine what properties of T make the associated S-act has any of these properties.
Facial trauma in children and adolescents is reported to range from 1% to 30%. Because of many anatomical, physiological, and psychological characteristics of the pediatric population, maxillofacial injuries in children should be treated with special consideration that is attributable to certain features inherent in facial growth patterns of children. This study evaluated maxillofacial injuries in 726 children in terms of incidence, patterns of injury, causes, and treatment modalities and compared these parameters among 3 pediatric age groups. Intergroup differences were analyzed using Z test for 2 populations' proportion. The results showed that the incidence of pediatric maxillofacial injuries and fractures is higher than that reported el
... Show MoreIn this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group ï£ (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of ï£ (A). 2.  an element e  A such that ï³(e) = – 1  ï³ ïƒŽ X. 3. Xïž :={a  A\ ï³(a) = 1  ï³ ïƒŽ X} = 1. 4. If f and g are forms over A and if x  D(
... Show MoreThe current research aims to identify the self-regulation of university students, as well as to identify the significance of the difference in self-regulation according to the variable of sex (male-female), specialization (scientific-human), and grade (first-fourth). To achieve the research objectives, the two researchers developed a scale of (28) items about self-regulation According to the theory of (Pandora, 1991). The scale was administered to (500) students from the first and fourth stages of Al -Mustansiriyah University who were selected based on the random stratification method for the 2020/2021 academic year. The results showed that university students have a good level of self-regulation. There are no significant differences in
... Show MoreThe research addressed the problem of widows that increased recently enormously. The researcher also referred to the perspective of Islam that gave a significant attention for both widows and orphans as powerless groups. Some straightforward example were presented to reflect the actual difficulties that encounter these groups as well as the author proposed number of appropriate ways that mitigate their psychological and physical sufferings such as: the provision of convenience jobs, and the legislation of rule that save their rights. Moreover, the researcher addressed the importance of marrying widows and what these challenges that encounter polygamy in Arab societies, the advantages and disadvantages of polygamy, and discussing all the
... Show MoreComputer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties,
Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application.
This study comes to shed light on the legal na
... Show MoreThe diagnoses system of varicose disease has a good level of performance due to the complexity and uniqueness in patterns of vein of the leg. In addition, the patterns of vein are internal of the body, and its features are hard to duplicate, this reason make this method not easy to fake, and thus make it contains of a good features for varicose disease diagnoses. The proposed system used more than one type of algorithms to produce diagnoses system of varicose disease with high accuracy, in addition, this multi-algorithm technique based on veins as a factor to recognize varicose infection. The obtained results indicate that the design of varicose diagnoses system by applying multi- algorithms (Naïve Bayes and Back-Propagation) produced n
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show More