Failure in asphalt mixture and distress in pavement are major issues to roads infrastructure. Selecting an appropriate chemical composition of asphalt cement is a key component in avoiding these issues. This work aimed to investigate the effect of the chemical composition of different polar fractions on the rheological and physical properties of asphalt cement. Four types of asphalt cement with penetration grades of 20/30, 40/50, 60/70 and 85/100 were divided into four fractions. Complex shear modules, rutting resistance and rotational viscosity of the asphalt cement were determined by using a Dynamic Shear Rheometer and a Rotation Viscometer, respectively. The results show that an increase in the asphaltene content and Gastel index resulted in an increase in the complex shear modulus, rutting resistance and rotation viscosity of the asphalt cement. The addition of more asphaltene content and Gastel index resulted in a decrease in penetration and ductility values. This observation also revealed that asphalt cement with higher asphaltene content had higher stiffness. The findings from this study can assist in the understanding of the behavior of asphalt cements in its original state and improve the performance of asphalt cement for pavement applications.
Immunization is one of the most cost-effective and successful public health applications. The results of immunization are difficult to see as the incidence of disease occurrence is low while adverse effects following the immunization are noticeable, particularly if the vaccine was given to apparently healthy person. High safety expectations of population regarding the vaccines so they are more prone to hesitancy regarding presence of even small risk of adverse events which may lead to loss of pub
... Show MoreThis study was conducted to test the effect of aqueous and alcoholic extracts for cyperus rotundus on the mitosis in tap roots of Allium cepa. the result of general an identical qualitative tests showed contains certain compounds that of crude aqueous and alcoholic extract, Used as five different concentrations of (10, 20.38, 56, 75) mg / ml for a period of four hours of treatment. After the chemical has been detected for some preliminary chemical compounds of the crude aqueous extract, while the alcoholic extract either phenol compound has been detected for phenols using several techniques included the use of thin layer chromatography TLC and measurement of disability factor RF and the degree of fusion and measurement of absorbance. The r
... Show MoreObliquely deposited (70o) Bi, Sb, and Bi-Sb alloy thin films have been prepared by thermal
resistive technique. Structural properties of these films were studied using XRD. Their resistance and
voltage responsivity for Nd:YAG and CO2 laser pulses have been recorded as function of operating
temperature between 10 oC and 120 oC. It was found that the maximum responsivity for these detectors
can be obtained at 75 oC. On the other hand, the dependence of responsivity on the width of detectors was
investigated.
Some structures such as tall buildings, offshore platforms, and bridge bents are subjected to lateral loads of considerable magnitude due to wind and wave actions, ship impacts, or high-speed vehicles. Significant torsional forces can be transferred to the foundation piles by virtue of eccentric lateral loading. The testing program of this study includes one group consists of 3 piles, four percentages of allowable vertical load were used (0%, 25%, 50%, and 100%) with two L/D ratios 20 and 30, vertical allowable load 110 N for L/D = 20 and 156 N for L/D = 30. The results obtained indicate that the torsional capacity for pile group increases with increasing the percentage of allowable vertical load, when the percentage of allowable vertica
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper