Preferred Language
Articles
/
7RcdK48BVTCNdQwC4VxP
Ag2S/ZnO Nanorods Composite Photoelectrode Prepared by Hydrothermal Method: Influence of Growth Temperature
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Feb 02 2017
Journal Name
Journal Of Geotechnical Engineering
Influence of Combined Stabilization on the Structural Properties of Subgrade Soil
...Show More Authors

Soil stabilization with liquid asphalt is considered as a sustainable step towards roadway construction on problematic subgrade soil, there are no requirements to import good quality materials or to implement energy consumption, but to mix the readily available soil with liquid asphalt through the cold mix technique. In this work, collapsible soil obtained from Nasiriya was mixed with asphalt emulsion, lime, and combinations of lime and asphalt emulsion (combined stabilization) and tested in the laboratory for California bearing ratio in dry and soaked conditions. Field trial sections have been prepared with the same combinations and subjected to plate bearing test. The influence of combined stabilization on the structural properties in ter

... Show More
Publication Date
Sat Jan 14 2017
Journal Name
Chemical And Biomolecular Engineering
Influence of Nano Additives on Unconfined Compressive Strength of Asphaltic Soil
...Show More Authors

Collapsible behaviour of soil is considered as one of the major problems in the stability of roadway embankment, the lack of cohesion between soil particles and its sensitivity to the change of moisture content are reasons for such problem. Creation of such cohesion may be achieved by implementation of liquid asphalt and introduction of Nano additives. In this work, silica fumes, fly ash and lime have been implemented with the aid of asphalt emulsion to improve the unconfined compressive strength of the collapsible soil. Specimens of 38 mm in diameter and 76 mm height have been prepared with various percentages of each type of Nano additive and fluid content. Specimens were subjected to unconfined compressive strength determination at dry a

... Show More
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The Influence of the Industrial Buyer Behavior on channels of distribution
...Show More Authors

Abstract:

This study deals with the influence of the industrial buyer behavior in Channels of distribution. It concentrates on one section of management levels in the company. Which is that of administrative managers The research problem is attempt to study and analysis the influence of industrial buyer behavior in channels of distribution.. The aiming at achieving a number of applicable goals depending on one major hypotheses I set a questionnaire in collecting the data and information relating to the study، which was distributed to sample of ( 30) department manager heads of section states company .  In order to process the data resorted to many statistical methods such as arithmetic means the sta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Engineering
Influence of Stone Powder on the Mechanical Properties of Clayey Soil
...Show More Authors

In this experimental study, the use of stone powder as a stabilizer to the clayey soil studied. Tests of Atterberg limits, compaction, fall cone (FCT), Laboratory vane shear (LVT), and expansion index (EI) were carried out on soil-stone powder mixtures with fixed ratios of stone powder (0%, 5%, 10%, 15%, and 20%) by the dry weight. Results indicated that the undrained shear strength obtained from FCT and LVT increased at all the admixture ratios, and the expansion index reduced with the increase of the stone powder.

View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Eurasian Chemico --technological Journal
Influence of addition (Mn) on enhance efficiency of (CuInTe2) photovoltaic cell
...Show More Authors

Publication Date
Tue Dec 22 2020
Journal Name
Lecture Notes In Civil Engineering
Influence of Magnetized Water on the Geotechnical Properties of Expansive Soil
...Show More Authors

View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Semiparametric Bayesian Method with Classical Method for Estimating Systems Reliability using Simulation Procedure
...Show More Authors

               In this research, the semiparametric Bayesian method is compared with the classical  method to  estimate reliability function of three  systems :  k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be

... Show More
View Publication Preview PDF
Crossref