The slurry infiltrated fiber concrete (SIFCON) is nowadays considered a special type of high fiber content concrete; it is high strength and high performance material. This paper investigates the effect of spread steel fiber into the slurry mortar on some properties of SIFCON. According to fiber distribution, two sets were used in this investigation. The first set consisted of randomly distributing fibers inside the slurry. The second set was by placing the fibers in an orderly manner inside the slurry. Crimped steel fibers with an aspect ratio of (60) were used. Two different volume fractions percentage of (7% and 9%) by volume of mold were used in both sets for this study. Also, a w/c ratio of (0.35) and superplasticizer of (1%) by weight of cement was used to ensure the penetration of the slurry inside the fibers. The compressive and flexural strength were conducted on standard cubes (10*10*10) cm and prisms of (40*7*7) cm respectively to find the effect of how the steel fibers were distributed. The results showed that distributing the fibers randomly gave better results than the ordered distribution. The increment percentage in compressive strength and flexural strength were (1.5%, 6.9%, 23%, and 6.5%), respectively, for both sets and both fiber volume fractions (7% and 9%).
In the era of the digital economy, public organizations need to consolidation the capabilities of entrepreneurial alertness to reduce the risks of sudden transformations and changes, and to find effective mechanisms to discover and invest in environmental opportunities proactively, as this concern has become a knowledge gap in public sector institutions, the current research aims to identify the role of digital competence in influencing on entrepreneurial alertness in the Central Bank of Iraq (CBI), the descriptive analytical approach was used as a research method to describe and analyze the main research variables. digital competence as an explanatory variable includes three dimensions: digital infrastructure, digital integration, and d
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreInnovative various Schiff bases and their Co(II), Ni(II) and Cu(II) and Hg(II) compounds made by the condensation of 4-amino antipyrine with derived aminobenzoic acid (2-aminobenzoic acid, 3-aminobenzoic acid, and 4-aminobenzoic acid ) have been prepared by conventional approaches. These complexes were described by magnetic sensibility analysis, FT-IR spectra, and molar-conductance and elemental analysis. Analytical values appeared which the mixed-ligand complexes presented ratio about 2:1 (ligand: metal) with the chelation 4 or 6. The prepared compounds offered a good effect on the organisms; bacteria Staphylococcus-aurous, Escherichia-coli and fungi C. albicans, A. niger. Also, the biological products signalize which the mixed compl
... Show MoreSchiff base (methyl 6-(2- (4-hydroxyphenyl) -2- (1-phenyl ethyl ideneamino) acetamido) -3, 3-dimethyl-7-oxo-4-thia-1-azabicyclo[3.2.0] heptane-2-carboxylate)Co(II), Ni(II), Cu (II), Zn (II), and Hg(II)] ions were employed to make certain complexes. Metal analysis M percent, elemental chemical analysis (C.H.N.S), and other standard physico-chemical methods were used. Magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identified. Theoretical treatment of the generated complexes in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (ΔH˚f), binding energy (ΔEb
... Show MoreSchiff base (methyl 6-(2- (4-hydroxyphenyl) -2- (1-phenyl ethyl ideneamino) acetamido) -3, 3-dimethyl-7-oxo-4-thia-1-azabicyclo[3.2.0] heptane-2-carboxylate)Co(II), Ni(II), Cu (II), Zn (II), and Hg(II)] ions were employed to make certain complexes. Metal analysis M percent, elemental chemical analysis (C.H.N.S), and other standard physico-chemical methods were used. Magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identified. Theoretical treatment of the generated complexes in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (ΔH˚f), binding energy (ΔEb), an
... Show More