Preferred Language
Articles
/
joe-667
Effect of Use Recycled Coarse Aggregate on the Behavior of Axially Loaded Reinforced Concrete Columns
...Show More Authors

Nowadays, the use of recycled waste construction materials instead of aggregates is becoming popular in construction owing to its environmental benefits. This paper presents an experimental and analytical campaign to study the behavior of axially loaded columns constructed from recycled aggregates. The latter was used instead of natural aggregates, and they were collected from the waste of previous concrete constructions. Different concrete mixtures made from varying amounts of recycled aggregates ranged from 0 to 50% of the total coarse aggregate were conducted to achieve 28 MPa. The effect of steel fibers is another investigated variable with volumes ranged from 0 to 2% concerning concrete’s mixture. The experimental results showed that the concrete strength is dependent on the amount of recycled aggregates. When the recycled aggregates were less than 30% of the total aggregates, they had a negligible effect on concrete strength and the load carrying capacity of the column models were improved. Also, the presence of steel fibers enhanced the load carrying capacity of the columns constructed from concrete with recycled aggregates of more than 30%. Finite element analysis (using ANSYS 16.1 software program) was conducted to simulate the experimental investigations, and they achieved good agreements with the test results.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On S*g--Open Sets In Topological Spaces
...Show More Authors

  In this paper, we introduce a new class of sets, namely , s*g--open sets and we show that the family of all s*g--open subsets of a topological space ) ,X(  from a topology on X which is finer than  . Also , we study the characterizations and basic properties of s*g-open sets and s*g--closed sets . Moreover, we use these sets to define and study a new class of functions, namely , s*g-  -continuous functions and s*g-  -irresolute functions in topological spaces . Some properties of these functions have been studied .

View Publication Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Functional enhancement and its reflection on industrial product systems
...Show More Authors

The research tagged (functional enhancement and its reflection on industrial product systems) focused on the possibility of enhancing industrial products in terms of form and functionality in a way that they are able to meet the needs of the user through the impact of technology and modern technologies on the functional enhancement of industrial products and their effectiveness in achieving formal and functional design variables, and producing products Industrial products are highly efficient and durable in order to improve them in order to meet the needs of the user, the transfer of technology between life forms and industrial products is desirable because the functional enhancement processes that occurred in general on industrial produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
Quantum Image Watermarking Based on Wavelet and Geometric Transformation
...Show More Authors

Like the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Sig

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Tax Audit and Its Impact on Tax Returns Quality
...Show More Authors

     The study aims at showing the role of tax audit in Impact the quality of tax statements. Tax audit is one of the most important means used by tax management to identify taxable revenues in a just, fair manner. The quality of statements relies on the extent to which the information provided by taxpayers is true and accurate. Tax audit works is compatible with the strategy of increasing tax adherence and detecting non-adherence cases and penalizing those who commit such violations. The study reached a number of results and conclusions. One of the most important results is that tax audit helps improve the information content of the taxpayers tax statements. This leads to recalculating taxable incomes and re-fixing t

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Clinical and Histopathological Study on Dog's Tumors in Iraq
...Show More Authors

The study was conducted on twenty dogs from variety breeds to estimate the
incidence of tumor mass and determine the risk factors of survey to cases of a year
in veterinary hospital in Baghdad. The most common clinical signs were, ulceration,
bleeding into lesions in addition to drowsiness, anorexia, fever and the others were
depended tumor's location in dog's body like lameness, lacrimation and bloody
constipation etc.
The results showed 70% of the infected dogs were working with military forces
and 30% of them were pet dogs and we found that the highest percentage of tumor
accrued in dogs aged more than 10 years and the females recorded 60% of infection.
Terrier breed had the highest percentage of infection (

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Single Face Detection on Skin Color and Edge Detection
...Show More Authors

Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding
...Show More Authors

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref