The Moisture damage is considered as one of the main challenge for the experts in the field of asphalt pavement design. The aims of the present study is to modify moisture resistance of the asphalt concrete by utilizing ceramic fibers as a type of reinforcement incorporated with hydrated lime. For this purpose, a penetration grade of the asphalt cement (40-50) was utilized as a binder with an aggregate of the maximum nominal size of 12.5mm and mineral filler limestone dust. A series of specimens has been fabricated by utilizing 0.50, 1.0, 1.5, and 2.0 percentages of ceramic fibers. For each of these contents, another subsequent group of specimens with hydrated lime with 0.0, 1.0, 1.5, and 2.0 percentages were moulded. For the addition of ceramic fiber and hydrated lime to the mixtures the dry method for ceramic fiber was adopted while for the hydrated lime, the saturated surface dry method was adopted. The results of this study have shown that the addition of 1% ceramic fiber with 1.5% hydrated lime recorded the highest levels of growth. Furthermore, the outputs of the tests used in this study have shown that the use of ceramic fibers resulted in a growth in the value of tensile strength ratio (TSR) and in the index of retained strength (IRS) compared with the control mixture. Maximum values for TSR were achieved at 1% ceramic fibers with 1.5 % hydrated lime.
This research is considered one of the important researches in Maysan Governorate, as it focuses on the construction of helicopter airport project in the oil fields of the Maysan Oil Company, where the oil general companies in Maysan Governorate suffer from the cost of transporting the foreign engineering experts and the governing equipment of sustaining oil industry from Iraq's international airports to oil fields and vice versa. Private international transport companies transport foreign engineering from the oil fields to Iraqi airports and vice versa, and other international security companies take action to provide protection for foreign engineering experts during transportation. Hence, this process is very costly.
&nbs
... Show MoreThis paper set forth the spatial suitability of the informal settlement supposed to be distributed by the Iraqis government to poor people. The Iraqi government identified 9 locations of informal settlement in Baghdad city and acceptance it as a reality as a help for them to getting home. In this paper I discovered the suitability of those locations which one will be suitable more than others for living. The analysis process was applied using the GIS environment – spatial analysis. According to the results, It has been identified as the most important measures to identify which one of these areas suitable for development for housing by using some criteria (Distance from the city center, Proximity from transport routes, Proximity of high v
... Show More<p><strong>Objective: </strong>The aim of our study was to compare between flavonoids and phenolic acids contents of leaves and fruits of <em>Melia azedarach</em> since no phytochemical investigation had done previously in Iraq.</p><p><strong>Methods: </strong>The leaves and fruits of <em>Melia azedarach </em>were extracted by soxhlet using 80% ethanol then the dried extract was suspended in water and fractionated using petroleum ether, chloroform, ethyl acetate, and n-butanol. The n-butanol fraction was hydrolyzed by acid and partitioned with ethyl acetate. The different fractions containing flavonoids and phenolic acids were analyzed by HPLC and HPTLC.</p><
... Show MoreThis paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima
... Show More<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt& pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi
... Show MoreCNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.