The Moisture damage is considered as one of the main challenge for the experts in the field of asphalt pavement design. The aims of the present study is to modify moisture resistance of the asphalt concrete by utilizing ceramic fibers as a type of reinforcement incorporated with hydrated lime. For this purpose, a penetration grade of the asphalt cement (40-50) was utilized as a binder with an aggregate of the maximum nominal size of 12.5mm and mineral filler limestone dust. A series of specimens has been fabricated by utilizing 0.50, 1.0, 1.5, and 2.0 percentages of ceramic fibers. For each of these contents, another subsequent group of specimens with hydrated lime with 0.0, 1.0, 1.5, and 2.0 percentages were moulded. For the addition of ceramic fiber and hydrated lime to the mixtures the dry method for ceramic fiber was adopted while for the hydrated lime, the saturated surface dry method was adopted. The results of this study have shown that the addition of 1% ceramic fiber with 1.5% hydrated lime recorded the highest levels of growth. Furthermore, the outputs of the tests used in this study have shown that the use of ceramic fibers resulted in a growth in the value of tensile strength ratio (TSR) and in the index of retained strength (IRS) compared with the control mixture. Maximum values for TSR were achieved at 1% ceramic fibers with 1.5 % hydrated lime.
Objective: the aim of this study is to invest age and determine the effect of using (2) packing
technique (conventional and new tension technique) on hardness of (2) types of heat cure acrylic
resin which are (Ivoclar and Qual dental type).
Methodology : this study was intended the using of two types of heat cure acrylic (IVoclar and
Qual dental type) which are used in construction of complete denture which packed in two different
packing technique (conventional and new tension technique) and accomplished by using a total of
(40) specimens in diameter of ( 2mm thickness, 2 cm length and 1 cm width) . This specimens were
sectioned and subdivide into (4) group each (10) specimens for one group , then signed as (A, Al B
The aim of this paper is to present the numerical method for solving linear system of Fredholm integral equations, based on the Haar wavelet approach. Many test problems, for which the exact solution is known, are considered. Compare the results of suggested method with the results of another method (Trapezoidal method). Algorithm and program is written by Matlab vergion 7.
To obtain the approximate solution to Riccati matrix differential equations, a new variational iteration approach was proposed, which is suggested to improve the accuracy and increase the convergence rate of the approximate solutons to the exact solution. This technique was found to give very accurate results in a few number of iterations. In this paper, the modified approaches were derived to give modified solutions of proposed and used and the convergence analysis to the exact solution of the derived sequence of approximate solutions is also stated and proved. Two examples were also solved, which shows the reliability and applicability of the proposed approach.
Friction stir welding (FSW) of Tee-joints is obtained by inserting a specially designed rotating pin into the clamped blanks, through top plate (skin) to bottom plate (stringer), and then moving it along the joint, limiting the contact between the tool shoulder and the skin. The present work aims to investigate the defects occur for Tee-joint of an Aluminum alloy (Al 5456) with dimensions (180mm x 70mm) for the skin plate, (180mm x 30mm) for stringer plate and thickness of (4mm).
The effects of welding parameters such as rotational speed, linear speed, plunging depth, tool tilting, and die radii of welding fixture on the welding quality of Aluminum Alloy will be studied. Weld defects had been summarized and studied, and then the best
The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreUnconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria. Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core. Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um
... Show MoreAmputation of the upper limb significantly hinders the ability of patients to perform activities of daily living. To address this challenge, this paper introduces a novel approach that combines non-invasive methods, specifically Electroencephalography (EEG) and Electromyography (EMG) signals, with advanced machine learning techniques to recognize upper limb movements. The objective is to improve the control and functionality of prosthetic upper limbs through effective pattern recognition. The proposed methodology involves the fusion of EMG and EEG signals, which are processed using time-frequency domain feature extraction techniques. This enables the classification of seven distinct hand and wrist movements. The experiments conducte
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More