This paper deals with load-deflection behavior the jointed plain concrete pavement system using steel dowel bars as a mechanism to transmit load across the expansion joints. Experimentally, four models of the jointed plain concrete pavement system were made, each model consists of two slabs of plain concrete that connected together across expansion by two dowel bars and the concrete slab were supported by the subgrade soil. Two variables were dealt with, the first is diameter of dowel bar (12, 16 and 20 mm) and the second is type of the subgrade soil, two types of soil were used which classified according to the (AASHTO): Type I (A-6) and type II (A-7-6). Experimental results showed that increasing dowel bar diameter from 12 mm to 20 mm has a little effect on load-deflection behavior of the tested specimens with only 5% increase in failure load. This may be attributed to that the failure (caused by flexural crack) depends mainly on concrete strength. Results also showed that decreasing CBR value of subgrade soil from 7% to 5% decreases failure load by about 33%.
The research seeks to identify the proposed scenarios to predict and ward off monetary credit risks that the bank is exposed to in the future, using the banking stress tests model, and showing their impact on capital adequacy and profitability ratio,To achieve this purpose, Sumer Commercial Bank was taken as a case study, and mathematical equations were used to extract the results. Low percentage of profits and returns, strictness in the process of granting credit and financing operations in order to reduce credit risks.
In this article we study a single stochastic process model for the evaluate the assets pricing and stock.,On of the models le'vy . depending on the so –called Brownian subordinate as it has been depending on the so-called Normal Inverse Gaussian (NIG). this article aims as the estimate that the parameters of his model using my way (MME,MLE) and then employ those estimate of the parameters is the study of stock returns and evaluate asset pricing for both the united Bank and Bank of North which their data were taken from the Iraq stock Exchange.
which showed the results to a preference MLE on MME based on the standard of comparison the average square e
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Praise be to God, who said: {And establish prayer and pay zakat and lend to God a good loan, and whatever good you put forward for yourselves you will find with God. It is better and greater in reward. Ask forgiveness of God. Indeed, God is Forgiving, Most Merciful. May blessings and peace be upon Muhammad, the servant of God, and His Messenger, may God bless him and grant him peace, who said: “Islam is built on five Testifying that there is no god but God and that Muhammad is the Messenger of God, establishing prayer, paying zakat, Hajj, and fasting Ramadan” ().
Now that follows: Islamic law aims to make man happy in this world and the afterlife, starting with faith in God Almighty until the end of the legal obligations. This is
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More