Self-repairing technology based on micro-capsules is an efficient solution for repairing cracked cementitious composites. Self-repairing based on microcapsules begins with the occurrence of cracks and develops by releasing self-repairing factors in the cracks located in concrete. Based on previous comprehensive studies, this paper provides an overview of various repairing factors and investigative methodologies. There has recently been a lack of consensus on the most efficient criteria for assessing self-repairing based on microcapsules and the smart solutions for improving capsule survival ratios during mixing. The most commonly utilized self-repairing efficiency assessment indicators are mechanical resistance and durability. On the other hand, Nondestructive methods have been widely used to visualize and assess cementitious composites, self-repairing behavior. However, certain issues remain, such as crack spread behavior, repairing agent kinetics on discrete crack surfaces, and the influence of inserted capsules on the mechanical characteristics of self-repaired cementitious composites, all of which require more investigations.
Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreThe aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on the understanding of thermodynamics, group work and self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq, for academic year 2011-2012. In this study, the pre and posttest were done and the instruments were administered to the students for data collection. Inferential statistics were employed to analyze data. The independent variables were the PBL, the PBL with lecture method, and the conventional teaching. Dependent variables of statistical analysis were
... Show MoreNonmissile penetrating spine injury (NMPSI) represents a small percent of spinal cord injuries (SCIs), estimated at 0.8% in Western countries. Regarding the causes, an NMPSI injury caused by a screwdriver is rare. This study reports a case of a retained double-headed screwdriver in a 37-year-old man who sustained a stab injury to the back of the neck, leaving the patient with a C4 Brown-Sequard syndrome (BSS). We discuss the intricacies of the surgical management of such cases with a literature review.
PubMed database was searched by the following combined formula of medical subjects headings,
The main objectives of this study were investigating the effects of the maximum size of coarse Attapulgite aggregate and micro steel fiber content on fresh and some mechanical properties of steel fibers reinforced lightweight self-compacting concrete (SFLWSCC). Two series of mixes were used depending on maximum aggregate size (12.5 and 19) mm, for each series three different steel fibers content were used (0.5 %, 1%, and 1.5%). To evaluate the fresh properties, tests of slump flow, T500 mm, V funnel time, and J ring were carried out. Tests of compressive strength, splitting tensile strength, flexural tensile strength, and calculated equilibrium density were done to evaluate mechanical properties. For reference mixes, the
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreA novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreThe fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t
... Show More