Internal curing is a method that has been advised to decrease the primary age cracking, mainly of concrete mixes using low (water to cementitious materials - w/cm) ratios corresponding to the self-compacting concrete-(SCC). This research aims to study the effect of the internal curing using saturated lightweight aggregate- (LWA) on the steel reinforcing corrosion in SCC. In this research, crushed bricks or thermostone were partially replaced by (20%) by the weight of sand and volumetrically measured. The results showed that the steel reinforcement of internally cured concrete showed a slight increase in corrosion up to 300 days of exposure to the saline solution (containing 3.5% NaCl). The ability of using the crushed bricks or thermostone as a replacement of natural sand as internal curing has no adverse effect on the corrosion of steel reinforcement.
The present work reports a direct experimental comparison of the catalytic hydrodesulfurization of
thiophene over Co-Mo/Al2O3 in fixed- and fluidized-bed reactors under the same conditions. An
experimental pilot plant scale was constructed in the laboratories of chemical engineering department,
Baghdad University; fixed-bed unit (2.54 cm diameter, and 60cm length) and fluidized-bed unit (diameter of 2.54 cm and 40 cm long with a separation zone of 30 cm long and 12.7 cm diameter). The affecting
variables studied in the two systems were reaction temperature of (308 – 460) oC, Liquid hourly space
velocity of (2 – 5) hr-1, and catalyst particle size of (0.075-0.5) mm. It was found in both operations that the
conversion
Fingerprint recognition is one among oldest procedures of identification. An important step in automatic fingerprint matching is to mechanically and dependably extract features. The quality of the input fingerprint image has a major impact on the performance of a feature extraction algorithm. The target of this paper is to present a fingerprint recognition technique that utilizes local features for fingerprint representation and matching. The adopted local features have determined: (i) the energy of Haar wavelet subbands, (ii) the normalized of Haar wavelet subbands. Experiments have been made on three completely different sets of features which are used when partitioning the fingerprint into overlapped blocks. Experiments are conducted on
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slun
... Show More
In this research a computational simulation has been carried out on the design and properties of the electrostatic mirror and a mathematical expression has been suggested to represent the axial potential of an electrostatic mirror. The electron beam path using the Bimurzaev technique had been investigated as mirror trajectory with the aid of Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements. The Electrode shape of mirror two electrodes has been determined by using package SIMION computer program. Computations have shown that the suggested potentials giv
... Show MoreIn the current research, an eco-biosynthesis method for synthesizing silver nanoparticles (AgNPs) is reported using thymus vulgaris leaves (T. vulgaris) extracts. The optical and structural properties of the nanoparticles is determined using UV-visible, x-ray diffraction (XRD) and field emission scanning electron microscope (FESEM). In addition, the synthesis factors such as the temperature, the molar ratio of silver nitride and thymus vulgaris leaves extract have been investigated. The XRD pattern presented higher intensity for the five characteristic peaks of silver. FESEM images for same samples indicated that the particle size was distributed between 24-56 nm. In addition, it’s observed the formation of some aggregated Ag particles
... Show MoreA demonstration of the inverse kinematics is a very complex problem for redundant robot manipulator. This paper presents the solution of inverse kinematics for one of redundant robots manipulator (three link robot) by combing of two intelligent algorithms GA (Genetic Algorithm) and NN (Neural Network). The inputs are position and orientation of three link robot. These inputs are entering to Back Propagation Neural Network (BPNN). The weights of BPNN are optimized using continuous GA. The (Mean Square Error) MSE is also computed between the estimated and desired outputs of joint angles. In this paper, the fitness function in GA is proposed. The sinwave and circular for three link robot end effecter and desired trajectories are simulated b
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show More