The construction of highly safe and durable buildings that can bear accident damage risks including fire, earthquake, impact, and more, can be considered to be the most important goal in civil engineering technology. An experimental investigation was prepared to study the influence of adding various percentages 0%, 1.0%, and 1.5% of micro steel fiber volume fraction (Vf) to reactive powder concrete (RPC)—whose properties are compressive strength, splitting tensile strength, flexural strength, and absorbed energy—after the exposure to fire flame of various burning temperatures 300, 400, and 500 °C using gradual-, foam-, and sudden-cooling methods. The outcomes of this research proved that the maximum reduction in mechanical properties is detected in case of 0% addition at burning temperature of 500 °C using sudden cooling to be 63.90%, 55.77% and 53.8% for compressive, splitting tensile, and flexural strength, respectively, while using 1.5% produced a modification in compressive strength, splitting tensile strength, and flexural strength to 6.67%, 4.15%, and 7.00% respectively, and 7.10 kN·mm for the absorbed energy for gradual cooling at 300 °C. From the results, the adopted cooling methods can be ordered according to their negative influence by sudden, foam, and gradual, while the optimum percentage of (Vf) is 1.5% when burning at 300 °C for all methods of cooling. 1.0% is considered the optimum percentage for all burning temperatures that exceed 400 °C using sudden-cooling method.
Racism is a serious issue that impacts a lot of people around the world. Since slavery days, racial discrimination has been increasing to abhorrent levels in relation to black people. The aim of individual psychology by Alfred Adler is to study human behaviour by situating it in the social context which makes his writing ideal to explanation of racism. This paper aims to study racism in Roy Williams’ Fallout from the perspective of Alfred Adler’s theory. Alfred Adler's individual psychology emphasizes the importance of social factors in shaping individual behavior, including the ways in which individuals form their sense of self and identity. This makes it a valuable framework for understanding the complex social and psychological facto
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreOur aim in this paper is to study the relationships between min-cs modules and some other known generalizations of cs-modules such as ECS-modules, P-extending modules and n-extending modules. Also we introduce and study the relationships between direct sum of mic-cs modules and mc-injectivity.
The world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
In this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MorePraise be to God, who is satisfied with Islam as our religion, “He opened a clear conquest for us,” and whoever works with us through the Shari’ah works and protects us. And that our master and Mawlana Muhammad His servant and Messenger is a prophet who has been merciful and compassionate. "
And after:
The occupation of Iraq and the accompanying bone events, and the following severe obstacles, resulted in a set of problems that require legitimate stances, and satisfactory answers, remove confusion and delusion, amid the clash of opinions and contradictions of jurisprudence. Work and application.
Among the difficult problems that surfaced in light of the new political developments on the land of Iraq: (the ruling on dealing
Givers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.
This encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.
In this respect the Audit function comes to che
... Show Moreكان لنهاية الحرب الباردة وعولمة العالم على وفق رؤية كونية تتجاوز حدود ومفاهيم السيادة الوطنية والقومية الاثر الواضح في ترتيب العلاقات الدولية , واصبحت تلك العلاقات تدور حول محورين الاول .. هو الاعتماد المتبادل بين الدول من اجل الوصول الى خطوط مشتركة للمصالح المختلفة بين هذه الدول . والآخر.. هو تبعية الدول الضعيفة للدول القوية لافتقار الاولى توفير الحاجيات الى مواطنيها . هذا يشير الى نشأة علا
... Show More