Roller-Compacted Concrete (RCC) is a zero-slump concrete, with no forms, no reinforcing steel, no finishing and is wet enough to support compaction by vibratory rollers. Because the effectiveness of curing on properties and durability, the primary scope of this research is to study the effect of various curing methods (air curing, emulsified asphalt(flan coat) curing, 7 days water curing and permanent water curing) and different porcelanite (local material used as an Internal Curing agent) replacement percentages (volumetric replacement) of fine aggregate on some properties of RCC and to explore the possibility of introducing more practical RCC for road pavement with minimum requirement of curing. Cubes specimens were sawed from the slabs of (38*38*10) cm for determination of compressive strength. The results show that using (5) % porcelanite improved the compressive strength of RCC (with air curing) as compared with reference RCC (with permanent curing) by percentage ranging from(-2.9 to 6)%.
Abstract\
preparation process of performance evaluation in organizations is of extreme importance, and under development in organizations and the opening of markets and technological developments in the industry and heightened competition among industrial organizations imposed systems are built for performance give a clear picture about performance and competition, And centered research problem in answering the following questions: Is performance evaluation system is available in Wasit State Company for Textile Industries(Research sample ), This research aims to assess the performance of policies and programs in the company, according to guide performance evaluation of programs and policies prepared by the Dutch Cou
... Show MoreThe Light and the Dark is the fourth novel in a series written by Charles Percy Snow where it tackles a phase of gifted scholar and remarkable individual Roy Calvert as he search for a source of power and meaning in life to relieve his inner turmoil. The character Roy Calvert is based on Snow's friend, Charles Allbery who exposes the message the character of Roy intends to convey in a certain phase of his life and the prophecy the novel carries amid catastrophe so widespread in the thirties of the twentieth century
The main purpose of the research is to study the significance of the event in the explicit source and its significance in the Mimi source and to explain the difference between them in the Holy Quran, especially since most linguists were not interested in what the Mime source indicates in the text, but focused on its form and form, as they defined it as the name Linguists and grammarians did not mention a difference in meaning between the explicit source and the Mimi source, and they interpret the second in the first sense, which led me to choose this topic, to know the significance of each source through Appeal to the maqam and occasion in a challenge D The exact meaning.
There is no doubt that the advertisement picture and the written text play a key role in the formation of the language of the communicative discourse as the main pillars of the design of commercial advertising and the main entrance for the advertising message awareness... Hence the researcher chose the title of her research (Integrative Relationship between the Picture and the Written Text in the Printed Commercial Advertisement) starting from following questions: What is the relationship between the picture and the written text in the printed commercial declaration? Is there functional, aesthetic and interactive integration between them?
&n
... Show Moreلخلاصة تشغل قضايا الهوية محور اهتمام الكثير من الباحثين والدارسين في بنية المجتمعات ومستقبل الدول, وفي كثير من الدراسات التي كتبها هؤلاء كان هناك ميل نحو دراسة الهوية وعلاقتها بحركة الدول تقدما وتراجعا ,فهناك من عزا تقدم دولة ما إلى نجاح نخبها السياسية في صناعة هوية جامعة لحالة التنوع الذي يميز مجتمعها, ويمكن ان تشير الى الولايات المتحدة الامريكية كأنموذج للنجاح في هذا الاطار.وهناك من ارجع
... Show MoreThis research investigates the methods of producing Investigative Arabic Television Programs that are able to prove its existence during a short period of time as a form of Television programs on Arab satellite channels growing in number and varied in content. The research aims to present qualitative and quantitative descriptions of the methods used in tackling the topics discussed in the program, and knowing whether they satisfy the conditions and scientific foundations for the research, investigation, analysis, and interpretation. The researcher uses the survey method and uses the tool of content analysis including a set of methodological steps that seek to discover the implied meaning of the research sample represented by the program
... Show MoreThe effect of micro-and nano silica particles (silica SiO2 (100 μm), Fused silica (12nm)) on some mechanical properties of epoxy resin was investigated (Young's modulus, Flexural strength). The micro-and nano composites were prepared by using three steps process with different volume fraction of micro-and nano particles (1, 2, 3, 4, 5, 7, 10, 15, and 20 vol. %). Flexural strength and Young's modulus of nano composites were increased at low volume fraction (max. enhancement at 4 vol.% ). However at higher volume fraction both Young's modulus and flexural strength decrease. Moreover, above, the mechanical properties are enhanced more than that of neat epoxy resin. The flexural strength decreases with increasing the volume fraction of micr
... Show MoreMO Khudhair, 2020
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More