An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show MoreIn this work, some mechanical properties of the polymer coating were improved by preparing a hybrid system containing Graphene (GR) of different weight percentages (0.25, 0.5, 1, and 2wt%) with 5wt% carbon fibres (CF) and added to a polymer coating by using casting method. The properties were improved as GR was added with further improvement on adding 5wt% of CF. The impact strength of acrylic polymer with GR increases with increasing weight ratio of GR; maximum value was obtained when the polymer coating was incorporated with 1wt% GR and 5wt% CF. The impact strength of acrylic polymer with GR and GR/CF composites incorporated with GR at 1wt% and CF at 5wt%. Hardness increase with increasing weight ratio of Gr and a significant imp
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreWith the continuous progress of image retrieval technology, the speed of searching for the required image from a large amount of image data has become an important issue. Convolutional neural networks (CNNs) have been used in image retrieval. However, many image retrieval systems based on CNNs have poor ability to express image features. Content-based Image Retrieval (CBIR) is a method of finding desired images from image databases. However, CBIR suffers from lower accuracy in retrieving images from large-scale image databases. In this paper, the proposed system is an improvement of the convolutional neural network for greater accuracy and a machine learning tool that can be used for automatic image retrieval. It includes two phases
... Show MoreBackground: Dental anomalies are abnormal tooth condition occurs due to certain genes or environmental factor disturb tooth development during morphodifferentiation stages, affecting group of teeth or entire dentition. The aim of the study is to evaluate the frequency of occurrence of dental anomalies among dental student. Materials and Methods: Three hundred dental students with age ranged (18-23 years) were examined clinically and radiographically searching for dental anomalies in shape, number and position. Results: Only 25 students (8.3 %) from the total sample (300) had dental anomalies, female form the higher percentage of anomalies (about 68%) compared to male (32%). The age group (22 years) which was the larger group had a higher
... Show MoreArtificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing artificial TABU algorithm to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as sport, chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement.
Let h is Γ−(λ,δ) – derivation on prime Γ−near-ring G and K be a nonzero semi-group ideal of G and δ(K) = K, then the purpose of this paper is to prove the following :- (a) If λ is onto on G, λ(K) = K, λ(0) = 0 and h acts like Γ−hom. or acts like anti–Γ−hom. on K, then h(K) = {0}.(b) If h + h is an additive on K, then (G, +) is abelian.
Experimental programs based test results has been used as a means to find out the response of individual elements of structure. In the present study involves investigated behavior of five reinforced concrete deep beams of dimension (length 1200 x height 300 x width150mm) under two points concentrated load with shear span to depth ratio of (1.52), four of these beams with hallow core and
retrofit with carbon fiber reinforced polymer CFRP (with single or double or sides Strips). Two shapes of hallow are investigated (circle and square section) to evaluated the response of beams in case experimental behavior. Test on simply supported beam was performed in the laboratory & loaddeflection, strain of concrete data and crack pattern of
Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show More