Preferred Language
Articles
/
SIa6Z4YBIXToZYALPokd
A sustainable pavement concrete using warm mix asphalt and hydrated lime treated recycled concrete aggregates
...Show More Authors

Recently, increasing material prices coupled with more acute environmental awareness and the implementation of regulation has driven a strong movement toward the adoption of sustainable construction technology. In the pavement industry, using low temperature asphalt mixes and recycled concrete aggregate are viewed as effective engineering solutions to address the challenges posed by climate change and sustainable development. However, to date, no research has investigated these two factors simultaneously for pavement material. This paper reports on initial work which attempts to address this shortcoming. At first, a novel treatment method is used to improve the quality of recycled concrete coarse aggregates. Thereafter, the treated recycled aggregates were used in warm mix asphalt at varied rates to replace virgin raw coarse aggregates. The asphalt concrete mixes produced were tested for modulus, tensile strength, permanent deformation, moisture susceptibility and fatigue life. The comparison of these properties with that of the mixes using the same rates of untreated course aggregates from the same source has demonstrated the effectiveness of the new technology. Lastly, the cost, material and energy saving implications are discussed.

Crossref
View Publication
Publication Date
Fri Mar 15 2024
Journal Name
Iraqi Statisticians Journal
Estimate a nonparametric copula density function based on probit and wavelet transforms
...Show More Authors

This study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log

... Show More
View Publication
Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
The dynamics of a delayed ecological model with predator refuge and cannibalism
...Show More Authors

This study has contributed to understanding a delayed prey-predator system involving cannibalism. The system is assumed to use the Holling type II functional response to describe the consuming process and incorporates the predator’s refuge against the cannibalism process. The characteristics of the solution are discussed. All potential equilibrium points have been identified. All equilibrium points’ local stability analyses for all time delay values are investigated. The system exhibits a Hopf bifurcation at the coexistence equilibrium, which is further demonstrated. The center manifold and normal form theorems for functional differential equations are then used to establish the direction of Hopf bifurcation and the stability of the per

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Nov 17 2023
Journal Name
Nasaq
A Semantic Study of Thematic Progression in Selected American and British Movies
...Show More Authors

ZG Abdulrazaq, MR Younus, Nasaq, 2023

View Publication
Publication Date
Fri Sep 24 2021
Journal Name
Arab World English Journal
A Pragma- Stylistic Analysis of Formal Congratulatory Letters in English and Arabic
...Show More Authors

Politeness strategies are of significant importance to maintain the face of the addressee. Senders of formal congratulatory letters seek to create a positive image in the minds of their addresses by performing particular illocutionary acts and face-saving acts (FSAs) in the form of written texts. To the best knowledge of the researcher, this topic received little attention from linguistic researchers, especially on the pragma-stylistic level. The importance of this study arises from the fact that congratulatory formal letters are an effective tool in the successful performance of foreign relations and thus deserve investigation. The current study investigates the pragmastylistic aspects of illocutionary acts and FSA Politeness Stra

... Show More
Preview PDF
Clarivate Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Nov 17 2020
Journal Name
Journal Of Physics: Conference Series
A trial treatment of Hydatidosis in white mice by Immunization and Chemicals
...Show More Authors

The present study was conducted as atrial to treat secondary hydatidosis in white mice of species Mus musculus. (Balb/c strain), experimentally infected with secondary hydatid cysts of sheep origin. The immunization process was carried by using CF/PS antigen which consist hydatid cyst fluid (CF) antigen, and protoscolices (PS) antigen mixed together and by using two concentrations 7.5, 15 mg/ml. Then derivatives of Benzimidazole, Mebendazole (M) and drugs Albendazole (A) were used 10 and 40 μm/gm body weight respectively. The mixture of drugs was used one week after challenged dose. Criteria taken into consideration to define the activity of the immunization and chemotherapy in this study were reduction in the numeral of cysts, the coeffic

... Show More
View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Tue Feb 16 2021
Journal Name
Sys Rev Pharm
Schiff Bases and Their Metal Complexes Derived from Ortho-phthalaldehyde: A review
...Show More Authors

Publication Date
Thu Jun 30 2016
Journal Name
Al-kindy College Medical Journal
Secondary skull tumors: Prevalence, MRI findings as a diagnostic tool, and treatment
...Show More Authors

Background: Skull secondary tumors are malignant bone tumors which are increasing in incidence.Objective: The objectives of this study were to present clinical features , asses the outcome of patients with secondary skull tumors ,characterize the MRI features, locations, and extent of secondary skull tumors to determine the frequency of the symptomatic disease.Type of the study: This is a prospective study.Methods: This is a prospective study from February 2000 to February 2008. The patients were selected from five neurosurgical centers and one oncology hospital in Baghdad/Iraq. The inclusion criteria were MRI study of the head(either as an initial radiological study or following head CT scan when secondary brain tumor is suspected , vis

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Engineering
A Laboratory Study Attempt of Flow and Energy Dissipation in Stepped Spillways
...Show More Authors

A new laboratory study conducted on stepped spillways in order to investigate their efficiency of dissipating flow energy. All previous study on stepped spillway indicated that the flow energy dissipation decreased as increasing in discharge. Increasing in the step numbers and the spillway slope led to energy dissipation decrease. In this study, an experimental attempt to increase energy dissipation at variable discharges was performed on stepped spillway and that leads to decreasing the cost of initiating the stilling basin or may be ignoring it. Five spillways were constructed from concrete and tested to investigate and compare among them. Three were roughed by gravel with different size for each one, one of them was s

... Show More
View Publication Preview PDF