Recently, interest in the use of projectiles in research on recycling waste materials for construction applications has grown. Using recycled materials for the construction of asphalt concrete pavement, in the meantime, has become a topic of research due to its significant benefits, such as cost savings and reduced environmental impacts. This study reports on comprehensive experimental research conducted using a typical mechanical milling waste, iron filing waste (IFW), as an alternative fine aggregate for warm mix asphalt (WMA) for pavement wearing surface applications. A type of IFW from a local machine workshop was used to replace the conventional fine aggregate, fine natural sand (FNS), at percentages of 25%, 50% 75%, and 100% by the weight of FNS of the size passing sieve No. 50. Experimental tests were conducted on the mixes to compare their Marshall properties, resilient moduli, rutting and fatigue resistance, and moisture susceptibility. Finally, a performance analysis was carried out using the VESYS 5W software on the constructed pavement using the IFW mixes. Both the experiment and the modeling work demonstrated that IFW can be an effective alternative resource for replacing natural fine aggregate in WMA concrete and provided details on the optimum rate based on the comprehensive data obtained first hand.
Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreThe economy is exceptionally reliant on agricultural productivity. Therefore, in domain of agriculture, plant infection discovery is a vital job because it gives promising advance towards the development of agricultural production. In this work, a framework for potato diseases classification based on feed foreword neural network is proposed. The objective of this work is presenting a system that can detect and classify four kinds of potato tubers diseases; black dot, common scab, potato virus Y and early blight based on their images. The presented PDCNN framework comprises three levels: the pre-processing is first level, which is based on K-means clustering algorithm to detect the infected area from potato image. The s
... Show MoreThe aim of the current study is to in evaluate the role of SOD activity in the previously reported oxidative stress in our laboratory(1), in the patients with different brain tumors. SOD activity was assayed according to riboflavin/NBT method and its specific activity was calculated in patients with benign and malignant brain tumors and control. Moreover the specific activity was compared in these samples according to gender and the occurrence of disease.Non significant elevation (P > 0.05) in SOD specific activity was observed in tissue of malignant tumors in comparison to that of in benign brain tumors. While a highly significant decrease (P < 0.001) of the specific activity was found in sera of malignant patients group in comparison to t
... Show MoreThis study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log
... Show MoreThe main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show More