This investigation was undertaken to evaluate the effectiveness of using Hydrated lime as a (partial substitute) by weight of filler (lime stone powder) with five consecutive percentage namely (1.0, 1.5, 2.0, 2.5, 3.0) % by means of aggregate treatment, by introducing dry lime on dry and 2–3% Saturated surface aggregate on both wearing and binder coarse. Marshall design method, indirect tensile test and permanent deformation under repeated loading of Pneumatic repeated load system at full range of temperature (20, 40, 60) C0 were examined The study revealed that the use of 2.0% and 1.5 % of dry and wet replacement extend the pavement characteristics by improving the Marshall properties and increasing the TSR%. Finally, increase permanent deformation distress form by exhibiting mixture with lower slope value and flatter curve trend of intercepts plus the improvement in resilient modulus properties. The test result indicated that despite the less effect of wet method in Marshall Properties, it seems to most effective in reduce the premature of combined moisture damage and permanent deformation that were considered the major distress form currently, better than dry method of replacement
Our aim in this paper is to study the relationships between min-cs modules and some other known generalizations of cs-modules such as ECS-modules, P-extending modules and n-extending modules. Also we introduce and study the relationships between direct sum of mic-cs modules and mc-injectivity.
Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreFinding similarities in texts is important in many areas such as information retrieval, automated article scoring, and short answer categorization. Evaluating short answers is not an easy task due to differences in natural language. Methods for calculating the similarity between texts depend on semantic or grammatical aspects. This paper discusses a method for evaluating short answers using semantic networks to represent the typical (correct) answer and students' answers. The semantic network of nodes and relationships represents the text (answers). Moreover, grammatical aspects are found by measuring the similarity of parts of speech between the answers. In addition, finding hierarchical relationships between nodes in netwo
... Show MoreLet R be a prime ring and δ a right (σ,τ)-derivation on R. In the present paper we will prove the following results:
First, suppose that R is a prime ring and I a non-zero ideal of R if δ acts as a homomorphism on I then δ=0 on R, and if δ acts an anti- homomorphism on I then either δ=0 on R or R is commutative.
Second, suppose that R is 2-torsion-free prime ring and J a non-zero Jordan ideal and a subring of R, if δ acts as a homomorphism on J then δ=0 on J, and if δ acts an anti- homomorphism on J then either δ=0 on J or J
Z(R).
This paper devoted to the analysis of regular singular initial value problems for ordinary differential equations with a singularity of the first kind , we propose semi - analytic technique using two point osculatory interpolation to construct polynomial solution, and discussion behavior of the solution in the neighborhood of the regular singular points and its numerical approximation, two examples are presented to demonstrate the applicability and efficiency of the methods. Finally , we discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems.
Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.
We report a method of converting non-conductive plastic surfaces into conductive by plating either copper electroless or copper electroplating -carbon black containing bending Agent onto Perspex plastics . Various approaches have been studied in order to comparing properties of the plated copper for two methods such as scanning electron microscopy (SEM),thickness, roughness, porosity, tensile Strength and elongation. The results show that the surface of electroplating was uniform, compact, and continuous and it had an obvious metallic sheen, while the surface of plated copper for electroless for it had many pores. Also observed that the coating was composed of small cells. Thes
... Show MoreFeature selection represents one of the critical processes in machine learning (ML). The fundamental aim of the problem of feature selection is to maintain performance accuracy while reducing the dimension of feature selection. Different approaches were created for classifying the datasets. In a range of optimization problems, swarming techniques produced better outcomes. At the same time, hybrid algorithms have gotten a lot of attention recently when it comes to solving optimization problems. As a result, this study provides a thorough assessment of the literature on feature selection problems using hybrid swarm algorithms that have been developed over time (2018-2021). Lastly, when compared with current feature selection procedu
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has