Conventional concretes are nearly unbendable, and just 0.1 percent of strain potential makes them incredibly brittle and stiff. This absence of bendability is a significant cause of strain failure and has been a guiding force in the production of an elegant substance, bendable concrete, also known as engineered cement composites, abbreviated as ECC. This type of concrete is capable of displaying dramatically increased flexibility. ECC is reinforced with micromechanical polymer fibers. ECC usually uses a 2 percent volume of small, disconnected fibers. Thus, bendable concrete deforms but without breaking any further than conventional concrete. This research aims to involve this type of concrete, bendable concrete, that will give solutions for concrete deficiencies. Two types of Portland Limestone Cement were used, Karasta (CK) and Tasluja (CT). Four mixes were adopted, polypropylene fibers (PP) and polyvinyl alcohol solution (PVA) were conducted to prepare the mixes. The tests were carried out at the age of 28 days of water curing. Best results were presented for mixes containing pp fibers and PVA solution than those without fibers for drying shrinkage and creep tests
The primary objective of this study was to identify the mechanisms for the development and propagation of longitudinal cracks that initiate at the surface of composite pavement. In this study the finite element program ANSYS version (5.4) was used and the model worked out using this program has the ability to analyze a composite pavement structure of different layer properties. Also, the aim of this study was modeling and analyzing of the composite pavement structure with the physical presence of crack induced in concrete underlying layer. The results obtained indicates that increasing the thickness of the asphalt layer tends to decrease the stress intensity factor, which may be attributed to the rapidly decrease of horizontal tensile st
... Show MoreA particulate composite material was prepared by adding the Titanium dioxide (TiO2) with a particle size of (75-150) µm to Epoxy resin at weight percentage of (10%,20%,30%,40%,50%).The following some mechanical properties were studied,fracture toughness, hardness.casting preparation methods were used in this study includes preparing plate of matrix and composites. specimens were prepared according to ASTM for the Mechanical properties tests. After that Another samples were heat treated for three and six hour at 65C?. Fracture toughness (Kic) represent for stress intensity factor results were showed that the curve of three hours aging increases in fracture toughness (Kic) for composites but for six hours aging increases fracture tough
... Show MoreLaser drilling is capable of producing small, precisely positioned holes with high degree of reproductively. In this paper , IR millisecond Nd:YAG single pulsed laser was used to determine the effect of laser parameters on the drilled hole of the glass - fiber reinforced epoxy composite FR-4 sample of 2 mm in thickness . The type of laser source was GSI lumonics JK760TR Series laser 1.064μm system in a CNC cabin. The JK760TR series has a 0.3-50ms pulse length and a maximum repetition rate 500Hz with an average power of 600W. The investigation of single pulse laser drilling in this paper was based on theoretical and experimental solutions. In single pulse technique, the investigation included focal plane position fpp, pulse shap
... Show MoreThe paper presents an investigation to the flutter speed of composite wing for different ply orientation. Structurally the composite wing was idealized as a composite beam load carrying structure. Theodorsen’s expression was used to get the 2- dimension unsteady lifting force and pitching moment in the limit of incompressible flow and subsonic speed which were integrated over the wing span. A free vibration analysis was first carried out to get the natural frequencies and mode shapes .The velocity-damping (V-g) method was used to calculate the flutter speed and the flutter frequency. A wing of unmanned aerial vehicle was manufactured from woven glass and polyester resin where the flutter speed was calculated experimentally by the wind
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show Morein this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
This study investigated the application of the crystallization process for oilfield produced water from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). Zero liquid discharge system (ZLD) consists of several parts such as oil skimming, coagulation/flocculation, forward osmosis, and crystallization, the crystallization process is a final part of a zero liquid discharge system. The laboratory-scale simple evaporation system was used to evaluate the performance of the crystallization process. In this work, sodium chloride solution and East Baghdad oilfield produced water were used as a feed solution with a concentration of 177 and 220 g/l. The impact of temperature (70, 80, and 90 °C), mixing speed (300, 400, and 500 rp
... Show More