This investigation aims to study some properties of lightweight aggregate concrete reinforced by mono or hybrid fibers of different sizes and types. In this research, the considered lightweight aggregate was Light Expanded Clay Aggregate while the adopted fibers included hooked, straight, polypropylene, and glass. Eleven lightweight concrete mixes were considered, These mixes comprised of; one plain concrete mix (without fibers), two reinforced concrete mixtures of mono fiber (hooked or straight fibers), six reinforced concrete mixtures of double hybrid fibers, and two reinforced concrete mixtures of triple hybrid fibers. Hardened concrete properties were investigated in this study. G
This investigation aims to study some properties of lightweight aggregate concrete reinforced by mono or hybrid fibers of different sizes and types. In this research, the considered lightweight aggregate was Light Expanded Clay Aggregate while the adopted fibers included hooked, straight, polypropylene, and glass. Eleven lightweight concrete mixes were considered, These mixes comprised of; one plain concrete mix (without fibers), two reinforced concrete mixtures of mono fiber (hooked or straight fibers), six reinforced concrete mixtures of double hybrid fibers, and two reinforced concrete mixtures of triple hybrid fibers. Hardened concrete properties were investigated in this study. G
The process of cognitive representation includes mental activities such as perception, concepts formation and decision making leading to formation of Cognitive representation where the need for Cognition is one of basic humane needs promoting individuals to have more information.
This Study aims to measure the level of Cognitive representation among gifted Schools, the level of need for Cognition among them, recognize statistical Significant differences with Cognitive representation according to gender Variable and recognize the Correlation between Cognitive representation and the need for Cognition among giftel schools . The sample Consists of subsample of mair application one Consisting of( 400) students, noting that the first sampl
Rock engineers widely use the uniaxial compressive strength (UCS) of rocks in designing
surface and underground structures. The procedure for measuring this rock strength has been
standardized by both the International Society for Rock Mechanics (ISRM) and American Society
for Testing and Materials (ASTM), Akram and Bakar(2007).
In this paper, an experimental study was performed to correlate of Point Load Index ( Is(50))
and Pulse Wave Velocity (Vp) to the Unconfined Compressive Strength (UCS) of Rocks. The effect
of several parameters was studied. Point load test, Unconfined Compressive Strength (UCS) and
Pulse Wave Velocity (Vp) were used for testing several rock samples with different diameters.
The predicted e
This paper deals with the role of the clergy in the Church and artists in the emergence of this art, which is represented by an atmosphere of spiritual, aesthetic, artistic, technical and engineering very magnificence and is located in two Find.Chapter One: the stages of stained glass in the Middle AgesThe Architects Goths to get rid of the walls gradually, based Baloctav plane, columns and beams strengthened with the vehicle, as previously mentioned, making the building looks like a glass of excessive use of colored windows building, this art has been known to the art of stained glass And the second chapter: the stages of stained glass in the Middle Ages Department of Winston (Winston) works of stained glass since its inception in the t
... Show MoreIn this communication, introduce the split Mersenne and Mersenne-Lucas hybrid quaternions, also obtaining generating functions and Binet formulas for these hybrid quaternions and investigating some properties among them.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreEfficacy of Varnishes with: Bioactive Glass, Recaldent Technology and Silver Diamine Fluoride in Comparison with Sodium Fluoride on Tooth Surface Micro-hardness (an In Vitro Study)