The aim of this research work is to study the effect of stabilizing gypseous soil, which covers vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties to be used as a base course layer replacing the traditional materials of coarse aggregate and broken stones which are scarce at economical prices and hauling distances. Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%, medium curing cutback asphalt (MC-30), and hydrated lime are used in this study. The conducted tests on untreated and treated gypseous soil with different percentages of medium curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and one dimensional confined compression under both dry and absorbed test conditions. The test results showed that stabilizing gypseous soil using the optimum fluid content of 16% (5% cutback asphalt+11% water) have improved the unconfined compressive strength, compressibility, rebound consolidation, and waterproofing of gypseous soil, but under absorbed condition the stabilized gypseous soil using cutback asphalt only did not satisfy the requirements for base course construction, therefore it was decided to use lime additive to improve the properties of soil-cutback mixture under absorbed condition.
The avoidance of failure in construction projects is not an easy task, which makes the failure of the construction project to achieve its objectives a major problem experienced by all countries in the world, especially Iraq. Where nearly two-thirds of the construction projects in the world have been suffered by significant problems as an increase in the cost of the project, delay in the specified duration for execution, and stopping the project. Therefore it is required to study and apply new methods for managing the construction project to ensure its success and achieve its objectives. The aim of this study is to study the Agile project management method and its impact on the construction project. In addition, to identi
... Show MoreThe information required for construction quantities surveying is not only generated by various participants in different construction phases but also stored in different forms including graphics, text, tables, or various combinations of the three. To report a bill of quantities (BOQ), the project manager has to continuously excerpt information from various resources and record it on papers. Without adequate staff and time, this repetitive and tedious process is difficult for the project manager to handle properly and thus reduces the effectiveness and the accuracy of the quantities surveying process which creates problems during the design, tender, and construction supervision of construction projects for designers and contractors pract
... Show MoreDue to the increasing number of people with in Iraq, it has become necessary to treat seriously this problem, which was not considered significantly to the best of researcher knowledge. Thus, the current research aims to construct a scale to measure the physical down syndromes, which distinguish them from others. It consisted of (39) items. The researcher has presented some related literature that addressed the current problem
Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreIn this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.
Spatial and frequency domain techniques have been adopted in this search. mean
value filter, median filter, gaussian filter. And adaptive technique consists of
duplicated two filters (median and gaussian) to enhance the noisy image. Different
block size of the filter as well as the sholding value have been tried to perform the
enhancement process.