Nowadays, the use of recycled waste construction materials instead of aggregates is becoming popular in construction owing to its environmental benefits. This paper presents an experimental and analytical campaign to study the behavior of axially loaded columns constructed from recycled aggregates. The latter was used instead of natural aggregates, and they were collected from the waste of previous concrete constructions. Different concrete mixtures made from varying amounts of recycled aggregates ranged from 0 to 50% of the total coarse aggregate were conducted to achieve 28 MPa. The effect of steel fibers is another investigated variable with volumes ranged from 0 to 2% concerning concrete’s mixture. The experimental results showed that the concrete strength is dependent on the amount of recycled aggregates. When the recycled aggregates were less than 30% of the total aggregates, they had a negligible effect on concrete strength and the load carrying capacity of the column models were improved. Also, the presence of steel fibers enhanced the load carrying capacity of the columns constructed from concrete with recycled aggregates of more than 30%. Finite element analysis (using ANSYS 16.1 software program) was conducted to simulate the experimental investigations, and they achieved good agreements with the test results.
The study includes collection of data about cholera disease from six health centers from nine locations with 2500km2 and a population of 750000individual. The average of infection for six centers during the 2000-2003 was recorded. There were 3007 cases of diarrhea diagnosed as cholera caused by Vibrio cholerae. The percentage of male infection was 14. 7% while for female were 13. 2%. The percentage of infection for children (less than one year) was 6.1%, it while for the age (1-5 years) was 6.9%and for the ages more than 5 years was 14.5%.The total percentage of the patients stayed in hospital was 7.7%(4.2%for male and 3.4%for female). The bacteria was isolated and identified from 7cases in the Central Laboratory for Health in Baghdad. In
... Show MoreThe quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show MoreAuthentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi
A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c
Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
The present study examines the main points of differences in the subject of greetings between the English language and the Arabic language. From the review of the related literature on greetings in both languages, it is found that Arabic greeting formulas are more elaborate than the English greetings, because of the differences in the social customs and the Arabic traditions and the Arabic culture. It is also found that Arabic greetings carry a religious meaning basing on the Islamic principle of “the same or more so”, which might lead to untranslatable loopholes when rendered in English.
Givers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.
This encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.
In this respect the Audit function comes to che
... Show MoreJurisprudence is one of the most honorable sciences in value, and the greatest of them in reward. Through it, the rulings of religion are known. He, may God’s prayers and peace be upon him, said: ((Whoever God desires good, He gives him understanding of religion)), and through it, the legal rulings and what is related to them are known from what is permissible and forbidden.
And prayer is the believer’s ascent to his Lord, with which the heart is at peace and the soul is at ease. If he, may God’s prayers and peace be upon him, was overwhelmed by an issue or something became difficult for him, he would panic in prayer and be reassured by it. It was necessary for the students of knowledge to investigate its aspects and its secrets
In this paper, we obtain a complete characterization for the norm and the minimum norm attainment sets of bounded linear operators on a real Banach spaces at a vector in the unit sphere, using approximate ðœ–-Birkhoff-James orthogonality techniques. As an application of the results, we obtained a useful characterization of
bounded linear operators on a real Banach spaces. Also, using approximate ðœ–-Birkhoff -James orthogonality proved that a Banach space is a reflexive if and only if for any closed hyperspace of , there exists a rank one linear operator such that , for some vectors in and such that 𜖠.Mathematics subject classification (2010): 46B20, 46B04, 47L05.
In this paper, new concepts which are called: left derivations and generalized left derivations in nearrings have been defined. Furthermore, the commutativity of the 3-prime near-ring which involves some
algebraic identities on generalized left derivation has been studied.