Preferred Language
Articles
/
IRcMCo4BVTCNdQwCGzCP
The Fire Effect on the Performance of Reinforced Concrete Beams with Partial Replacement of Coarse Aggregates by Expanded Clay Aggregates
...Show More Authors

This paper aims to investigate the flexural behavior of reinforced concrete beams considering fire resistance by adding Lightweight Expanded Clay Aggregates (LECA) to the concrete mix as partial coarse aggregate replacement. LECA is a type of porous clay with a uniform pore structure with fine, closed cells and hard, tightly sintered skin. The experimental work comprised four reinforced self-compacted concrete beams. All the specimens were identical in their geometrical layout of 1600×240×200 mm, reinforcement details, and support condition (simply supported). For all the beams, the main reinforcement was provided by two bars, each having a diameter of 12 mm, while a bar of 6 mm diameter was employed for the top and shear reinforcement. Each beam had a different replacement ratio of LECA for coarse aggregates (0, 10, 20, and 30%). All the specimens were tested under static two concentrated loads after being exposed to the fire of steady-state temperature (500 oC), 1 hr duration, and sudden cooling process. The results showed that adding LECA reduced the number and width of the generated cracks due to fire and reduced the deterioration of the ultimate load capacity and beam rigidity (stiffness).

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
ON CERTAIN SUB-SPACE OF X
...Show More Authors

The study of properties of space of entire functions of several complex variables was initiated by Kamthan [4] using the topological properties of the space. We have introduced in this paper the sub-space of space of entire functions of several complex variables which is studied by Kamthan.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Bulletin Of The Iraq Natural History Museum
Survey of Brachycera flies on alfalfa
...Show More Authors

Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Impact of Computer on Human Health
...Show More Authors

As computers become part of our everyday life, more and more people are experiencing a
variety of ocular symptoms related to computer use. These include eyestrain, tired eyes, irritation,
redness, blurred vision, and double vision, collectively referred to as computer vision syndrome.
The effect of CVS to the body such as back and shoulder pain, wrist problem and neck pain.
Many risk factors are identified in this paper.
Primary prevention strategies have largely been confined to addressing environmental
exposure to ergonomic risk factors, since to date, no clear cause for this work-related neck pain
has been acknowledged. Today, millions of children use computers on a daily basis. Extensive
viewing of the compute

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
On-Site Generation of Sodium Hypochlorate
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Evaluation of cellular immune response in Golden Hamsters experimentally infected with Leishmania donovani comparing with cellular immune response against chicken Red Blood Cells.
...Show More Authors

The Evaluation of the immune response in Golden Hamsters experimentally infected with Leishmania donovani was determined in this study, particularly, the cellular immune response. Follow up has maintained to determine the Delayed Type of Hypersensitivity using skin test both in infected and control lab animals. Chicken red blood cells were used as a parameter to evaluate the immune system; they are dull and have the ability of immunization. Two concentrations of chicken R.B.C were examined to determine which gives the higher titration in Hamsters and those were 1.5 X 109 cell/ml and 3 X 109 cell/ml , the second concentration gave the maximum titration where then used in this work. After sensitization with Chicken R.B.C for both infected a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Evaluation of cellular immune response in Golden Hamsters experimentally infected with Leishmania donovani comparing with cellular immune response against chicken Red Blood Cells.
...Show More Authors

The Evaluation of the immune response in Golden Hamsters experimentally infected with Leishmania donovani was determined in this study, particularly, the cellular immune response. Follow up has maintained to determine the Delayed Type of Hypersensitivity using skin test both in infected and control lab animals. Chicken red blood cells were used as a parameter to evaluate the immune system; they are dull and have the ability of immunization. Two concentrations of chicken R.B.C were examined to determine which gives the higher titration in Hamsters and those were 1.5 X 109 cell/ml and 3 X 109 cell/ml , the second concentration gave the maximum titration where then used in this work. After sensitization with Chicken R.B.C for both in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
The International Tinnitus Journal
Adenoidectomy and Endoscopic Myringotomy with and without ventilation tube insertion for Treatment of Otitis Media with Effusion in 6-12 years old Children
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Image data compression by using multiwavelete for color image
...Show More Authors

There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja

View Publication Preview PDF
Publication Date
Wed Oct 06 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref