This paper deals with load-deflection behavior the jointed plain concrete pavement system using steel dowel bars as a mechanism to transmit load across the expansion joints. Experimentally, four models of the jointed plain concrete pavement system were made, each model consists of two slabs of plain concrete that connected together across expansion by two dowel bars and the concrete slab were supported by the subgrade soil. Two variables were dealt with, the first is diameter of dowel bar (12, 16 and 20 mm) and the second is type of the subgrade soil, two types of soil were used which classified according to the (AASHTO): Type I (A-6) and type II (A-7-6). Experimental results showed that increasing dowel bar diameter from 12 mm to 20 mm has a little effect on load-deflection behavior of the tested specimens with only 5% increase in failure load. This may be attributed to that the failure (caused by flexural crack) depends mainly on concrete strength. Results also showed that decreasing CBR value of subgrade soil from 7% to 5% decreases failure load by about 33%.
The best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.
... Show MoreNowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject
... Show MoreThis research aims to analyze and explain the economic advantage to the concepts and measures that are related with added economic value.
Added economic value is considered as one of efficient tools which evaluates the performance of corporated industrial companies. in addition to that the research studied the traditional accounting measure which is used in evaluation of the project and industrial companies.
The research tested and analyzed the added economic value measure in some industrial companies and reached to a major recommendation:
- We must replace the traditional measure by the new measure that accounts the added value.
- We have to train all the workers whom working in the levels of a
The research aims at identifying the extent to which the top management in the organization is interested in managing the talents of its employees, through which it can face the competing organizations, as well as the great challenges faced by all organizations in recent years. The task of attracting and maintaining talented human resources is one of the biggest challenges facing Organizations
... Show More
Soil is the cardinal resource for agricultural crops. Healthy soil will produce healthy plants. Since healthy soil is the important goal for the farmers, they need to select the best tillage system to achieve that goal. There are two main types of tillage systems. Conservation tillage (no-tillage farming) uses agricultural machinery that performs a double function; tillage and seed farming simultaneously. In contrast, conventional tillage farming uses multiple agricultural machines to till and seed the soil. The farmers in the northern governorates of Iraq have used the conservation farming system for a long time. However, the farmers who live in the middle and southern governorates in Iraq use conventional tillage farming. Because most of
... Show MoreChildhood is characterized by ahigh privacy in the life of the child overall educational institutions in the world. Based on this specificity, modern education begins with a holistic vision of the child through all developmental aspects (moral, religious, emotional, social, linguistic, physical, health, and mental). This integration could be achieved through taking into consideration the needs and rights of children and developing curricula that consider these needs and capacities to provide opportunities for developing and supporting the developmental aspects of the child. The contemporary technological developments in the field of computer and the Internet have brought with it new forms, ideas, and problems for children in recent years
... Show MoreIn this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.
Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More