Roller compacted concrete (RCC) is a concrete compacted by roller compaction. The concrete mixture in its unhardened state must support a roller while being compacted. The aim of this research work was to investigate the behavior and properties of roller compacted concrete when constructed in the laboratory using roller compactor manufactured in local market to simulate the field conditions. The roller compaction was conducts in three stages; each stage has different loading and number of passes of the roller. For the first stage, a load of (24) kg and (5) passes in each direction had been employed. For the second stage, a load of (104) kg and (10) passes in each direction were conducted. Finally, at the third stage, a load of (183) kg and (15) passes were adopted. Such procedure was in accordance to previous work conducted by the author. The effects of the type of coarse aggregate (crushed and rounded), fine aggregate (river and natural) and cement type (OPC and SRPC) on the mechanical properties of RCC were investigated. The effect of compaction method on compressive strength and indirect tensile strength was also discussed. A total of (26) roller compacted concrete slab samples of (380×380×100 mm) were prepared in the laboratory, Then, the slab specimens are taken out of the molds and immersed in the curing tank for (28) days. Core and Beam specimens were obtained from the slab samples for the determination of mechanical properties. Such properties include compressive, indirect tensile, flexural strengths using one point loading. It was concluded that the compressive strength of RCC using crushed aggregate is higher than that when using rounded aggregate in a range of (15-66) % for core specimens, while the compressive strength of RCC when using river sand is higher than that when using natural sand in a range of (9-26)% for core specimens. When river sand is implemented, RCC samples show higher indirect tensile strength than those with natural sand, such variation is within (7-8) %
The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather
... Show MoreThe dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on
... Show MoreUV-Vis technique has been used to study the adsorption of para-nitroaniline (PNA) on Iraqi siliceous rocks powder. Adsorption isotherms were investigated, temperature effect on adsorption was calculated, Results showed that the adsorption was an exothermic process and the thermodynamic functions were calculated. The effect of the pH on adsorption was studied and the ionic strength effect on adsorption was studied, It was found that adsorption increases with the presence of sodium chloride ions. The kinetic study of adsorption before equilibrium showed that the adsorption was pseudo first order according to according (Lagergren equation).
Numerous trace elements, notably metals, are essential for the normal functioning of several biological reactions, especially as enzyme cofactors. Several Trace elements refer to essential micronutrients required in minimal quantities for certain biological functions pertaining to human metabolism, albeit their minimal concentrations in the organism. Nonetheless, our understanding of this topic is considerably restricted, and emerging insights into their metabolic functions necessitate contributions and have implications across various domains, encompassing nutritional chemistry, with a focus on analytical chemistry, biological sciences, medicine, pharmacology, and agricultural sciences.
Numerous trace elements, notably metals, are essential for the normal functioning of several biological reactions, especially as enzyme cofactors. Several Trace elements refer to essential micronutrients required in minimal quantities for certain biological functions pertaining to human metabolism, albeit their minimal concentrations in the organism. Nonetheless, our understanding of this topic is considerably restricted, and emerging insights into their metabolic functions necessitate contributions and have implications across various domains, encompassing nutritional chemistry, with a focus on analytical chemistry, biological sciences, medicine, pharmacology, and agricultural sciences.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MorePiled raft is commonly used as foundation for high rise buildings. The design concept of piled raft foundation is to minimize the number of piles, and to utilize the entire bearing capacity. High axial stresses are therefore, concentrated at the region of connection between the piles and raft. Recently, an alternative technique is proposed to disconnect the piles from the raft in a so called unconnected piled raft (UCPR) foundation, in which a compacted soil layer (cushion) beneath the raft, is usually introduced. The piles of the new system are considered as reinforcement members for the subsoil rather than as structural members. In the current study, the behavior of unconnected piled rafts systems has been studie
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show More