Rutting has a significant impact on the pavements' performance. Rutting depth is often used as a parameter to assess the quality of pavements. The Asphalt Institute (AI) design method prescribes a maximum allowable rutting depth of 13mm, whereas the AASHTO design method stipulates a critical serviceability index of 2.5 which is equivalent to an average rutting depth of 15mm. In this research, static and repeated compression tests were performed to evaluate the permanent strain based on (1) the relationship between mix properties (asphalt content and type), and (2) testing temperature. The results indicated that the accumulated plastic strain was higher during the repeated load test than that during the static load tests. Notably, temperature played a major role. The power-law model was used to describe the relationship between the accumulated permanent strain and the number of load repetitions. Furthermore, graphical analysis was performed using VESYS 5W to predict the rut depth for the asphalt concrete layer. The α and µ parameters affected the predicted rut depth significantly. The results show a substantial difference between the two tests, indicating that the repeated load test is more adequate, useful, and accurate when compared with the static load test for the evaluation of the rut depth.
It is no secret for those concerned with language concerns that the issue of figurative feminization is one of the issues that does not follow a grammatical rule governed by the fact that the subject of knowledge of this is due to hearing as indicated by linguistic references and lexicons.This research opts to find out the origin of the feminization of the word sun in the Arabic language and in light of what some language specialists have argued that the origin of figurative feminization was due to non-linguistic motives related to religious and metaphysical beliefs, and that it was memory preserved in light of the linguistic heritage.The research concluded that the feminization of the sun goes back to what settled in their minds, which
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreOne of the most important intellectual issues, which receive attention is the issue of modernity, it has occupied the scholars of all time. However, modern poetry used to have special care in Iraq and in the Arab countries .. it is not strange that the concept of modernity is linked to history .. or having history as the most important dimension of its dimensions .. because Arab poetry is historical and it is moving into an area of the past that is still active in terms of language and literary image .. When some poets found that changing and modernizing poetry became a necessity of evolution, and one of the fundamentals of modernization, the cultural impact did not respond to the desire of poets, and their impulse in modern poetry
... Show MoreThe adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla
... Show MoreCysteine-cysteine chemokine ligand 5 (CCL5) is known to play an important role with immunoregulatory and inflammatory activities in the formation of granuloma during infection with Mycobacterium tuberculosis. About 90 subjects, involving 50 patients with pulmonary TB and 40 apparently healthy individuals (as a control group) were collected from primary health care center\AL-Sadur city sector/ Baghdad City/ Iraq, and at specialized chest and respiratory diseases center in Wassit City /Iraq during the period from January 2019 to May 2019. The study was carried out to investigate serum level of CCL-5 of both patients and control by using enzyme linked immunosorbent assay (ELISA), and to determine the association between CCL5 genotypes with pul
... Show MoreAdherence to cardiac medications makes a significant contribution to avoidance of morbidity and premature mortality in patients with cardiovascular disease. This quantitative study used cross‐sectional survey design to evaluate medication adherence and contributing factors among patients with cardiovascular disease, comparing patients who were admitted to a cardiac ward (
Dialogue is one of the most important means of calling to the Creator, as it is one of the scientific and verbal activities carried out by a group of interlocutors to present ideas they believe in, and evidence and proofs that express their views and demonstrate the reason for their belief in them, In order to arrive at the truth or a radical solution to a specific problem, so the interlocutor should pay attention to this science, study it and its etiquette, because the purposeful dialogue requires that the funniest of them be the most knowledgeable and knowledgeable about the axis of the hadith, and the funniest must also be able to be convinced of the rule of difference of opinion that does not spoil the issue of friendly They must also c
... Show MoreBecause of its importance in the world, Middle East area is one of the competition areas between the major and great powers. Among those powers are Russia and United states of America. The competition between these two powers to control Syria is greatly clear since 2011. It is also one of the most important subject in the international politics. This importance comes from the importance of Russia and the United States of America besides importance of the Middle East. At the end of the cold war, United States of America maintained its role in the international system and became the only pole that dominated the international affairs while Russia tried to overcome the challenges inherited from the former Soviet Union, and it succeeded in th
... Show MoreThe purpose of this study was to investigate the difference in mandibular trauma caused by two mechanisms for the delivery of missile injuries: firearms and improvised explosive devices (IEDs). The data investigated included sex, age, mechanism of injury, and other clinical and radiographic manifestations. Seventy consecutive patients, predominantly male, with a mean age of 28.6 ± 14 years (range 2–60 years) were enrolled: 38 patients (54.3%) sustained mandibular fractures caused by bullet injuries and 32 patients (45.7%) had mandibular fractures caused by IED explosion injuries. The study revealed that the differences in most of the investigated variables were not statistically significant; the only significant differences were the inci
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More