Rutting is a crucial concern impacting asphalt concrete pavements’ stability and long-term performance, negatively affecting vehicle drivers’ comfort and safety. This research aims to evaluate the permanent deformation of pavement under different traffic and environmental conditions using an Artificial Neural Network (ANN) prediction model. The model was built based on the outcomes of an experimental uniaxial repeated loading test of 306 cylindrical specimens. Twelve independent variables representing the materials’ properties, mix design parameters, loading settings, and environmental conditions were implemented in the model, resulting in a total of 3214 data points. The network accomplished high prediction accuracy with an R2 of 0.93 and a mean squared error (MSE) of 0.0039. Results based on the sensitivity analysis and variable importance techniques showed that the percentage of aggregate passing the 4.75 mm sieve and the (rice) theoretical maximum specific gravity (Gmm) were the most significant factors in predicting axial permanent strain (εp). Furthermore, the connection weight method highlighted input variables’ distinct positive and negative impacts on permanent deformation.
A cantilevered piezoelectric beam with a tip mass at its free end is a common energy harvester configuration. This paper introduces a new principle of designing such a harvester which increases the generated voltage without changing the natural frequency of the harvester: The attraction force between two permanent magnets is used to add stiffness to the system. This magnetic stiffening counters the effect of the tip mass on the natural frequency. Three setups incorporating piezoelectric bimorph cantilevers of the same type in different mechanical configurations are compared theoretically and experimentally to investigate the feasibility of this principle. Theoretical and experimental results show that magnetically stiffe
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreIn engineering, the ground in seismically active places may be subjected to static and seismic stresses. To avoid bearing capacity collapse, increasing the system's dynamic rigidity, and/or reducing dynamic fluctuations, it may be required to employ deep foundations instead of shallow ones. The axial aptitude and pipe pile distribution of load under static conditions have been well reported, but more study is needed to understand the dynamic axial response. Therefore, this research discusses the outputs of the 3D finite element models on the soil-pile behavior under different acceleration intensities and soil states by using MIDAS GTS NX. The pipe pile was represented as a simple elastic, and a modified Mohr-Coulomb mode
... Show MoreThe purpose of the study is to identify the teaching techniques that mathematics' teachers use due to the Brain-based learning theory. The sample is composed of (90) teacher: (50) male, (40) female. The results have shown no significant differences between male and female responses' mean. Additionally, through the observation of author, he found a lack of using Brain-based learning techniques. Thus, the researcher recommend that it is necessary to involve teachers in remedial courses to enhance their ability to create a classroom that raise up brain-based learning skills.
We introduce in this paper some new concepts in soft topological spaces such as soft simply separated, soft simply disjoint, soft simply division, soft simply limit point and we define soft simply connected spaces, and we presented soft simply Paracompact spaces and studying some of its properties in soft topological spaces. In addition to introduce a new types of functions known as soft simply
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThe current Iraqi standard specifications for roads and bridges allowed the prepared Job-Mix Formula for asphalt mixtures to witness some tolerances with regard to the following: coarse aggregate gradation by ± 6.0 %, fine aggregate gradation by ± 4.0 %, filler gradation by ± 2.0 %, asphalt cement content by ± 0.3 % and mixing temperature by ± 15 oC. The objective of this work is to evaluate the behavior of asphalt mixtures prepared by different aggregates gradations (12.5 mm nominal maximum size) that fabricated by several asphalt contents (40-50 grade) and various mixing temperature. All the tolerances specified in the specifications are taken into account, furthermore, the zones beyond these tolerances
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreThe valley Dwiridj of drainage basins task that lies east of Iraq and thus we have in this study the application of tow models athletes on the three basins of the valley to get Mor e values accurate to Estimate the volume of runoff and peak discharge and time climax and through the use of Technology remote sensing (GIS),has been show through the application of both models, that the maximum value for the amount of Dwiridj valley of (1052/m3/s) According to Equation (SCS-CN) and about (1370.2/m3/s)by approach (GIUH) that difference is the amount of discharge to the Equation (SCS-CN) ar not accurate as(GIUH) approaches Equation ecalling the results of the Field ces Department of damand reservoirs that the volume of runoff to the valley wase
... Show More