Everywhere carriers incur a measure of liability for the safety of the goods. Carriers are liable for any damage or for the loss of the goods that are in their possession as carriers unless they prove that the damage or loss is attributable to certain excepted causes. Damaged and lost items can unfortunately be a common problem when shipping freight. Legal responsibilities arise due to loss or damage during transit while cargo is in their care. This study intends to investigate the nature of the liability of the maritime carrier when this liability is realized, and the extent to which it can be paid or disposed of given the risks realized from the transportation process, which may result in damage or loss of the goods, and the damag
... Show MoreThis research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with economic concentration. &n
... Show MoreMineral filler is one of important materials and affecting on properties and quality of asphalt mixtures .There are different types of mineral filler depended on cost and quality , the matter encourages us to achieve this study to evaluate hydrated lime filler effects on properties of asphalt mixes related with strength and durability. Conventional asphaltic concrete mixtures with Portland cement and soft sandstone fillers and mixtures modified with hydrated lime were evaluated for their fundamental engineering properties as defined by Marshall properties , index of retained strength , indirect tensile strength , permanent deformation characteristics , and fatigue resistance .A typical dense graded mixture employed in construction
... Show MoreAbstract:The optimum design of the magnetic deflector with the lowest values of the radial and spiral distortion aberration coefficients was computed. The optimized calculations were made using three models, Glaser bell-shaped, Grivet-lenz and exponential models. By using the optimum axial field distribution, the pole pieces shape which gave rise to those field distributions was found by using the reconstruction method. The calculations show that the results of the three models coincide at the lower values of the excitation parameter. In general the Glaser- bell shaped model gives the optimum results at the whole range of the excitation parameter under investigation.The negative values of the spiral distortion aberration coefficient appears
... Show MoreThe research aims to measure the net nominal protection coefficients for the products table eggs and poultry meat and the extent of its impact on domestic production volume for the period of 1990- 2013 has been the use of mathematical formulas simplified in the calculation of the transaction process with a view to the extent of support and protection offered by the state pricing policy for products Resources Sector Animal in Iraq and reach search Highlights and most important, there are volatile price state policy with regard to eggs and poultry meat, as it ranged net nominal protection coefficients between the larger and less than the right one, which means that values are unstable to support local producers or consumers, and can be The
... Show MoreThe electron correlation for inter-shells (1s 2p), (1s 3p) and (1s 3d) was described by the inter-particle radial distribution function f(r12). It was evaluated for Li-atom in the different excited states (1s2 2p), (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). The inter particle expectation values for these shells were also evaluated. The calculations were performed using Mathcad 14 program.
This work presents the modeling of the electrical response of monocrystalline photovoltaic module by using five parameters model based on manufacture data-sheet of a solar module that measured in stander test conditions (STC) at radiation 1000W/m² and cell temperature 25 . The model takes into account the series and parallel (shunt) resistance of the module. This paper considers the details of Matlab modeling of the solar module by a developed Simulink model using the basic equations, the first approach was to estimate the parameters: photocurrent Iph, saturation current Is, shunt resistance Rsh, series resistance Rs, ideality factor A at stander test condition (STC) by an ite
... Show MoreX-ray diffractometers deliver the best quality diffraction data while being easy to use and adaptable to various applications. When X-ray photons strike electrons in materials, the incident photons scatter in a direction different from the incident beam; if the scattered beams do not change in wavelength, this is known as elastic scattering, which causes amplitude and intensity diffraction, leading to constructive interference. When the incident beam gives some of its energy to the electrons, the scattered beam's wavelength differs from the incident beam's wavelength, causing inelastic scattering, which leads to destructive interference and zero-intensity diffraction. In this study, The modified size-strain plot method was used to examin
... Show MoreFor the past few years, the sediment began to accumulate in Al-Gharraf River which reduces the flow capacity of the River. In the present research, a numerical model was developed using Hec-Ras software, version 5.0.4. to simulate the flow and sediment transport in the upper reach of the river. The hydrological and cross-section data measured by the Ministry of Water Resources, for the reach located between Kut and Hai cities and having a length of 58200 m, was used to perform calibration and verification of the model. Moreover, field sampling of suspended and bed loads was gathered for five months starting from 7/2/2019, and laboratory tests of samples were conducted to be used as in
Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co
... Show More