Preferred Language
Articles
/
wxZqSIcBVTCNdQwCIkEc
The effect of using different fibres on the impact-resistance of slurry infiltrated fibrous concrete (SIFCON)
...Show More Authors
Abstract<p>Slurry infiltrated fibrous concrete (SIFCON) is a modern type of fibre reinforced concrete (FRC). It has unique properties; SIFCON is superior in compressive strength, flexural strength, tensile strength, impact resistance, energy absorption and ductility. Because of this superiority in these characteristics, SIFCON was qualified for applications of special structures, which require resisting sudden dynamic loads such as explosions and earthquakes. The main aim of this investigation is to determine the effect of fibre type on the apparent density of SIFCON and on performance under impact load. In this investigation, hook-end steel fibre and polyolefin fibre were used. Purely once and hybrid in different portions again. After reviewing previous research, including [1, 2, 3] references three trail mixes were tested with a volume fraction of fibres (4, 6 and 8)%, and after testing them, a volume fraction of 6% was chosen. We chose the volume fraction of 6% and made the type of fibre the variable for comparison in this research. In hybrid fibres this fraction was divided once 2/3 steel fibres with 1/3 polyolefin fibres and vice versa. The specimens of the Impact resistance test were made with two specimens for each series, which are panels with dimensions of 50×50×5 cm. Three cubes were made for each series in the SIFCON apparent density test. Test results prove SIFCON produced from 2/3 polyolefin and 1/3 steel fibres achieved a good density reduction that contributes to reducing the self-weight of the structural element, which is a major aim in this investigation, reducing cost and maintaining high impact resistance.</p>
Crossref
View Publication
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir: הכנפיים שנשברו דמות האישה הערבית הנוצרית ברומן " חוצוצרה בוואדי " של סמי מיכאל לעומת דמותה ב " יסמין " של אלי עמיר
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
International Journal Of Health Sciences
effect of sensory marketing in enhancing customer loyalty by mediating marketing knowledge, survey research in a group of large single market in Baghdad
...Show More Authors

The research aims to measure the effect of sensory marketing (visual marketing, audio marketing, olfactory marketing, taste marketing, tactile marketing) in enhancing customer loyalty (behavioral loyalty, situational loyalty, perceptual loyalty) and the mediating role of marketing knowledge (product knowledge, price knowledge, promotion knowledge knowledge of distribution, knowledge of employees, knowledge of physical evidence, knowledge of the process) in a group of large single market markets in Baghdad and the researcher chose it because of the challenges faced by large single market in satisfying the customer and maintaining it as a permanent visitor and enhancing his loyalty, and the research problem was identified with a main

... Show More
View Publication
Crossref
Publication Date
Fri Nov 28 2025
Journal Name
Iraqi Journal Of Science
Synthesis and characterization of some 2-sulphanyl benzimidazole derivatives and study of effect as corrosion inhibitors for carbon steel in sulfuric acid solution
...Show More Authors

This research involves the synthesis of some sulphanyl benzimidazole derivatives (Ia-c), which were prepared from reaction of 2-mercaptobenzimidazole substituted benzyl halide, and structures were identified by spectral methods[FTIR, 1H-NMR and 13C-NMR].These compounds were investigated as corrosion inhibitors for carbon steel in 1M H2SO4 solution using weight loss, potentiostatic polarization methods; obtained results showed that the sulphanyl benzimidazole derivatives retard both cathodic and anodic reactions in acidic media, by virtue of adsorption on the carbon steel surface. This adsorption obeyed Langmuir’s adsorption isotherm. The inhibition efficiency of (Ia-c) ranging between (65-92) %. By using different Ib derivative conc

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
V. International Scientific Congress Of Pure, Applied And Technological Sciences
Lightweight Image Compression Using Polynomial and Transform Coding
...Show More Authors

Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Directive and Steerable Radiation Pattern using SASPA Array
...Show More Authors

This work examines the ability of a special type of smart antenna array known as Switched Active Switched Parasitic Antenna (SASPA) to produce a directive and electronically steerable radiation pattern. The SASPA array consists of antenna elements that are switchable between active and parasitic states by using P-Intrinsic-N (PIN) diodes. The active element is the element that is supplied by the radio frequency while short-circuiting the terminals of an element in the array results in a parasitic element. Due to the strong mutual coupling between the elements, a directional radiation pattern with high gain and a small beamwidth can be produced with only one active element operating at a time. By changing the parasitic state to the active

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

View Publication
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Nurse Scheduling Problem Using Hybrid Simulated Annealing Algorithm
...Show More Authors

Nurse scheduling problem is one of combinatorial optimization problems and it is one of NP-Hard problems which is difficult to be solved as optimal solution. In this paper, we had created an proposed algorithm which it is hybrid simulated annealing algorithm to solve nurse scheduling problem, developed the simulated annealing algorithm and Genetic algorithm. We can note that the proposed algorithm (Hybrid simulated Annealing Algorithm(GS-h)) is the best method among other methods which it is used in this paper because it satisfied minimum average of the total cost and maximum number of Solved , Best and Optimal problems. So we can note that the ratios of the optimal solution are 77% for the proposed algorithm(GS-h), 28.75% for Si

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref