Gypsum Plaster is an important building materials, and because of the availabilty of its raw materials. In this research the effect of various additives on the properties of plaster was studied , like Polyvinyl Acetate, Furfural, Fumed Silica at different rate of addition and two types of fibers, Carbon Fiber and Polypropylene Fiber to the plaster at a different volumetric rate. It was found that after analysis of the results the use of Furfural as an additive to plaster by 2.5% is the optimum ratio of addition to that it improved the flexural Strength by 3.18%.
When using Polyvinyl Acetate it was found that the ratio of the additive 2% is the optimum ratio of addition to the plaster, because it improved the value of the flexural strength by a rate of 3.44% of the value of standards fraction of the mixture of reference. It was noted that the optimum ratio for the addition of Fumed Silica to the plaster is the ratio of 1%, because this ratio of addition increases the flexural strength by 15.26%. For the addition of Carbon Fiber to the plaster it was found that the volumetric ratio of the additive 0.5% is the percentage of perfect accessory after taking into account cost and quality which gives an increase in Flexural Strength by rate of 41.43% .When using Polypropylene Fiber it was found that the optimum percentage ratio of addition 1.5%, where this ratio increases flexural strength by a rate of 23.67% . When using the mixture (PVCF), which contains 2% of Poly vinyl Acetate and 0.5% as a volumetric rate of the carbon fiber to the plaster, increases the value of Flexural Strength by a rate 62.92%. After analyzing the results for all mixtures it was found that the mixture (PVCF) is the best one to satisfy the aim of the research which is to get the best structural properties specially flexural strength for gypsum beams.
Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
Hemorrhoids are one of the most common surgical conditions. The hemorrhoid may cause symptoms that are: bleeding, pain, prolapse, itching, spoilage of feces, and psychologic discomfort. There are many methods for treatment of hemorrhoid like, medical therapy, rubber band ligation, electerocoagulation, stapled hemorrhoidpexy, photocoagulation, sclerothereapy, doppler guided artery ligation, Cryosurgery, and surgery. All methods for treatment of hemorrhoids have advantages, disadvantages, and limitations. Conventional haemorrhoidectomy was the traditional operation for the treatment of hemorrhoids. But recently other modalities of treatment had been used as an alternative operations including CO2 laser haemorrhoidectomy. This work aims to
... Show MoreIn this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.
Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten
... Show MoreThe science of jurisprudence is one of the legal sciences that scholars have been interested in since the first centuries of Islam, and they wrote many books about it, and the science of manuscripts is considered one of the scientific achievements in which many scholars emerged, including Imam Al-Samaani, so I chose this manuscript related to Istism to clarify its concept and meaning for all people, The student (Ali Ahmed Abdel-Aziz Sheikh Hamad) preceded me in the investigation of part of the book, and it was facilitated for me, by the grace of God Almighty, to investigate the issue (if one of the Muslim spouses apostatized and one of the infidel spouses converted to Islam until the end of the issue of if the two spouses were taken capt
... Show MoreBackground: Sialosis described as a specific consequence of diabetes. In diabetic sialosis, the increased volume of the glands is due to the infiltration of adipose in the parenchyma. The B-scan ultrasonography is a generally accepted tool for determining parotid gland enlargement. Oral health is, to a greater extent, dependent on quality and quantity of saliva, both of which may be altered in diabetics. This study was established to detect the enlargement of parotid gland in diabetic patient and study the changes in physical properties of saliva and its relation with the salivary gland enlargement. Subjects, Materials and Methods: A cross-sectional study with highly specified criteria with ages ranged (20-65) years, male and female subject
... Show MoreKE Sharqie, AA Al-Nuaimy, WJ Kadhum, SMJ, 2006 - Cited by 2