Preferred Language
Articles
/
IRcMCo4BVTCNdQwCGzCP
The Fire Effect on the Performance of Reinforced Concrete Beams with Partial Replacement of Coarse Aggregates by Expanded Clay Aggregates
...Show More Authors

This paper aims to investigate the flexural behavior of reinforced concrete beams considering fire resistance by adding Lightweight Expanded Clay Aggregates (LECA) to the concrete mix as partial coarse aggregate replacement. LECA is a type of porous clay with a uniform pore structure with fine, closed cells and hard, tightly sintered skin. The experimental work comprised four reinforced self-compacted concrete beams. All the specimens were identical in their geometrical layout of 1600×240×200 mm, reinforcement details, and support condition (simply supported). For all the beams, the main reinforcement was provided by two bars, each having a diameter of 12 mm, while a bar of 6 mm diameter was employed for the top and shear reinforcement. Each beam had a different replacement ratio of LECA for coarse aggregates (0, 10, 20, and 30%). All the specimens were tested under static two concentrated loads after being exposed to the fire of steady-state temperature (500 oC), 1 hr duration, and sudden cooling process. The results showed that adding LECA reduced the number and width of the generated cracks due to fire and reduced the deterioration of the ultimate load capacity and beam rigidity (stiffness).

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
Undesirable behaviors for university students by their instructors view
...Show More Authors

Undesirable behaviors among students  are consider one of the danger problems threating societies and educational and scientific institutions of countries  because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :

  1. Recognize undesirable behavior in students of University by the view of their instructors
  2. Measure the level of undesirable behavior in students of university by the view of their instructors
  3. Recognize more common  undesirable behavior in students of University by the view o

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
Salt Distribution in a Soil Irrigated by Subsurface Emitter
...Show More Authors

The best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Attention-Deficit Hyperactivity Disorder Prediction by Artificial Intelligence Techniques
...Show More Authors

Attention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jun 19 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Accounting information system and its role in enhancing competitivness in the public industrial sector companies in iraq, from the standpoint of the auditors at the federal supeme audit board field study
...Show More Authors

In a world of fierce competition companies of different activities strive to strengthen their competitiveness in order to be able to deliver greater value to their customers and gain a distinct sites in competition with other companies in the market at the local and international levels. Every company seeks to focus on one or more of the competitive capabilities in order to turn it into an obvious advantage or a number of competitive advantages to contribute in improving the performance and superiority over its competitors. Therefore, the management of companies no longer need only useful information for the internal aspects of the environment, but also need to include the external environment that includes various and constantly changin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Al–bahith Al–a'alami
A Dubbed Turkish Drama and their Effects of the Behavior of Algerian Women: A Survey Study of a Sample of Women – The City of Mesila is a Model
...Show More Authors

The study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In order to achieve these goals, the researcher relies on the descriptive approach in addition to the questionnaire and interviews to collect data. It ends with a number of results such as: The study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In ord

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Time in the Cinema...The Two Films (The Knife and The Deceived) -A Model: كريمة ناوي
...Show More Authors

This study deals with the time property in the cinema through two films: (The Knife) directed by Khalid Hamada and (The Deceived) directed by Tawfiq Saleh. These two films were excerpted by the cinema from two novels of the Palestinian writer Ghassan Kanafani, the first is from the novel (What is Left for You) and the second is from the novel (Men in the Sun).  If the Palestinian novel has imposed its presence on the Arab creative scene through a group of novelists who took it upon themselves to communicate their cause to the world,   the Palestinian cinema has been far from being a purely Palestinian, because many of the cinematic works have been provided by Arab countries on the issue, while this cinema is still seeking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
The Third International Conference On Mathematical Sciences
On Solvability of an Operator Equation
...Show More Authors

Publication Date
Mon Oct 01 2012
Journal Name
2012 Ieee International Conference On Circuits And Systems (iccas)
A survey of on-chip monitors
...Show More Authors

Systems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref