The slurry infiltrated fiber concrete (SIFCON) is nowadays considered a special type of high fiber content concrete; it is high strength and high performance material. This paper investigates the effect of spread steel fiber into the slurry mortar on some properties of SIFCON. According to fiber distribution, two sets were used in this investigation. The first set consisted of randomly distributing fibers inside the slurry. The second set was by placing the fibers in an orderly manner inside the slurry. Crimped steel fibers with an aspect ratio of (60) were used. Two different volume fractions percentage of (7% and 9%) by volume of mold were used in both sets for this study. Also, a w/c ratio of (0.35) and superplasticizer of (1%) by weight of cement was used to ensure the penetration of the slurry inside the fibers. The compressive and flexural strength were conducted on standard cubes (10*10*10) cm and prisms of (40*7*7) cm respectively to find the effect of how the steel fibers were distributed. The results showed that distributing the fibers randomly gave better results than the ordered distribution. The increment percentage in compressive strength and flexural strength were (1.5%, 6.9%, 23%, and 6.5%), respectively, for both sets and both fiber volume fractions (7% and 9%).
The study aims to investigate the degree of student teachers at Sultan Qaboos University acquired skills in teaching Arabic via a virtual micro-teaching lab, as well as to reveal the difficulties they faced and their development proposals. To do this, the researchers developed a questionnaire divided into four dimensions: planning, implementation, evaluation, and
ethical values for the teaching profession, in addition to two open-ended questions to identify difficulties and suggestions. It was administered to (30) student teachers. The results revealed that the average degree of student-teacher acquisition of skills was high in its four dimensions. It ranged between (39.2) to (82.2), while the overall average was (56.2).
... Show MoreBreast cancer has got much attention in the recent years as it is a one of the complex diseases that can threaten people lives. It can be determined from the levels of secreted proteins in the blood. In this project, we developed a method of finding a threshold to classify the probability of being affected by it in a population based on the levels of the related proteins in relatively small case-control samples. We applied our method to simulated and real data. The results showed that the method we used was accurate in estimating the probability of being diseased in both simulation and real data. Moreover, we were able to calculate the sensitivity and specificity under the null hypothesis of our research question of being diseased o
... Show MoreThe fundamental problem in determining the role of television programs in broadcasting the culture of community for peace through studying almosamig kareem program by studying the topics addressed in this program. It is a descriptive study and it follows the approach survey method. In this study, the spatial framework is limited to the program of almosamih kareem on YouTube, while the temporal framework is concerned with the episodes that are raised on YouTube from the second half of 2014 to 2015 of almosamih kareem program. The fundamental problem in determining the role of television programs in broadcasting the culture of community for peace through studying almosamig kareem program by studying the topics addressed in this
... Show More
The present article discusses innovative word-formation processes in Internet texts, the emergence of new derivative words, new affixes, word-formation models, and word-formation methods. Using several neologisms as an example, the article shows both the possibilities of Internet word-making process and the possibilities of studying a newly established work through Internet communication. The words selected for analysis can be attributed to the keywords of the current time. (In particular, the words included in the list of "Words of 2019") there are number of words formed by the suffix method, which is the traditional method of the Russian word formation. A negation of these words is usually made thro
... Show MoreAbstract
The objective of this research is to identify the analysis of the ethics of the administration in the development of the social responsibility of one government organizations, and to achieve the objectives of the research was the use of a questionnaire developed for the purpose of data collection and distribution to the research sample, was chosen as a total sample population (50) individuals were relying on statistical package to do a statistical analysis for this research, user, ANSI (SPSS) simple regression analysis, standard deviation, Pearson correlation coefficient.
Research findings show the role of social responsibility in achieving the university's strategy,
... Show MoreThe research aims to demonstrate the impact of tax techniques on the quality of services provided to income taxpayers by studying the correlational and influencing relationships between the exploited variable (tax techniques) and the dependent variable (the quality of services provided to income taxpayers), and in line with the research objectives, the main hypothesis of the research was formulated (there is a relationship Significance between tax techniques and the quality of services provided to income taxpayers) a number of sub-hypotheses emerged from this hypothesis that were stated in the research methodology, and a number of conclusions were reached, the most important of which were (through the use of the correlation coeff
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More