Preferred Language
Articles
/
joe-371
Influence of Internal Sulfate Attack on Some Properties of High Strength Concrete
...Show More Authors

One of the most important problems that faces the concrete industry in Iraq is the deterioration due to internal sulfate attack , since it  reduces the compressive strength and increases the expansion of concrete. Consequently, the concrete structure may be damage .The effects of total and total effective sulfate contents on high strength concrete (HSC) have been studied in the present study.

The research studied the effect of sulfate content in cement , sand and gravel , as well as comparing  the total sulfate content with the total effective SO3 content. Materials used were divided into two groups of SO3 in cement ,three groups of SO3 in sand ,and two groups of SO3 in gravel.

The results show that considering the total effective sulfate content is better than the total content of sulfates since the effect of sulfate in each constituent of concrete, depends on it's granular size .The smaller the particle size of the material the more effective is the sulfate in it. Therefore, it is recommended to follow the Iraqi specification for total effective sulfate content, because it gives more flexibility to the use of sand and gravel with higher sulfate content.

The results of compressive strength at 90-days show that the effect of total effective SO3 content of ( 2.647% , 2.992% , 3.424% ) that correspond to total sulfate of ( 3.778%, 3.294%, 4.528%)  decrease the compressive strength by (7.53%, 11.44%, 14.59%) respectively.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
Italian Journal Of Pure And Applied Mathematics
A NOTE ON STRONGLY FULLY STABLE BANACH ALGEBRA MODULES RELATIVE TO AN IDEAL
...Show More Authors

Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.

Scopus
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Crawling and Mining the Dark Web: A Survey on Existing and New Approaches
...Show More Authors

    The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. The

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Shift formal regulations on Mesopotamian pottery (Pottery Samarra model): محمد جاسم محمد العبيدي
...Show More Authors

Operated Alandziahih "drift theory" as a science talk in most of the cash and technical studies in the early twentieth century, making him and the sciences, arts and culture both fields of experiences, in an attempt to explore the institutions that theory, a number of laws which took control in the internal structures of those acts, resulting in for those institutions to be actively contribute their ideas to guide the pace on the right track. And thus lay the foundations of this theory, which was a big affair in the early twentieth century and still vigorous pace to this day, particularly their applications in various fields of the arts.Although each type of Arts, both in the composition or the theater or means of communication, took joi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
“Examine the Multi-Scattering Effect on the Detected Backscattering Photons By Cometary Molecules”
...Show More Authors

The effect of multiple scattering on the detected γ-photons at the surface of Hyakutake comet, which emitted from the radioisotope 137Cs were studied and compared the results with the single scattering case. Also the multiple scattering results were gathered with the single scattering case and investigate the effect. The calculations were conducted to analyze the variation of counts rate with source detector separation and the source of energy. Monte Carlo (MC) method was used to simulate the scattering and absorption of photons in semi-infinite material by developing the program in FORTRAN language (77 - 90) for this purpose. The distance between the source and the detector takes values of 1, 2,….5 cm, the results showed that single

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study on Candida spp. infection oral thrush and bacteria accompanied it from children
...Show More Authors

Oral swab samples were collected from 120 children (ages between one month- 10 years) who were infected with oral thrush and 30 healthy children. The percentages of isolated yeasts and Bacteria were 66.6% and 96.6% respectively. The dominate yeast and bacteria were Candida albicans and Staphylococcus aureus with of 78.7% and 34.4% respectively. Results revealed that the highest percent of infection with oral thrush disease was 32.5% in children within the age of 1-2 months.

View Publication Preview PDF
Crossref