Due to economic reasons or need for environmental conservatism or also preserve the natural resources; there has been an increasing shift towards the use of reclaimed asphalt pavement (RAP) materials in the pavement construction industry. Therefore, use the Reclaimed Asphalt Pavement (RAP) has been enormously increased in pavement construction and has been become common practice in many countries. Nevertheless, this is a relatively new concept in Iraq, and has to be remarked that is not used RAP in the production of HMA and this valuable material is mostly degraded. For this purpose, the reclaimed materials were collected from deteriorated pavement segments. The components of asphalt mixtures consist of: two asphalt penetration grades (40-50 and 85-100) brought from Daurah refinery. The aggregate gradation consists of (19) mm maximum size with limestone dust as a mineral filler. This work involved using the waste engine oil as a rejuvenating agent. All the types of tests result demonstrated that all mixtures, which contain RAP, have good properties compared with the virgin mixture. This demonstrated that mixtures with high RAP content could be successfully designed to meet the local volumetric and performance-specification requirements.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreA mounted specimen of a mustelid animal deposited in the Kurdistan Museum of Natural History, Salahaddin University, Erbil proved to be Mustela erminea (Linnaeus, 1758) and represents a new record for the mammalian fauna of Iraq. Its measurements and some biological noted are provided. Also, two passerine birds; the Red-headed bunting, Emberiza bruniceps Brandt, 1841(Family, Emberizidae) and the Variable wheatear, Oenanthe picata (Blyth, 1847) (Family, Muscicapidae) were recorded for the first time in Iraq. Furthermore, the tree frog Hyla savignyi Audouin, 1829 was found in two locations north east of Iraq with spotted dorsum and having interesting behavior in having the capabil
... Show MoreTo assess cultural competence among nursing students from nine countries to provide an international perspective on cultural competence.
A descriptive, cross‐sectional design.
A convenience sample of 2,163 nursing students from nine countries was surveyed using the Cultural Capacity Scale from April to November 2016.
The study found a moderate range of cultural competence among the students. The ability to teach and guide other nursing colleagues to displ
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.