Accurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equilibrium data point with very good accuracy. The developments of this method are applied on 13 binary systems at different temperatures which gives very good accuracy.
Experts have given much attention on the use of waste in asphalt paving because of its significance from a sustainability perspective. This paper evaluated the performance properties of asphalt concrete mixes modified with Crumb Rubber (CR) as a partial replacement for two grade sizes of fine aggregate (2.36, and 0.3 mm) at six replacement rates: 0%, 2%, 4%, 6%, 8%, and 10% by weight. Asphalt concrete mixes were prepared at their Optimum Asphalt Content (OAC) and then tested for their engineering properties. Marshall properties, fatigue, rutting, ideal CT index test, Scanning Electron Microscopy (SEM), and Energy-Dispersive X-ray (EDX) spectroscopy were deployed to examine the crystalline structure and elemental composition of the C
... Show MoreRegistration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration p
... Show MoreBackground: Ultrasonography has been used to examine the thickness of the lower uterine segment in women with previous cesarean sections in an attempt to predict the risk of scar dehiscence during subsequent pregnancy. The predictive value of such measurement has not been adequately assessed. Objectives: To correlate lower uterine segment thickness measured by trans abdominal ultrasound in pregnant women with previous cesarean section with that measured during cesarean section by caliper and to find out minimum lower uterine segment thickness indicative of integrity of the scar.Methods: A prospective observational study at Elwyia Maternity Teaching Hospital, from January 2011 to January 2012. A total of 143 women were enrolled in the stu
... Show MorePurpose: to demonstrate the possibility of moving to electronic data exchange dimensions (regulatory requirements, technical requirements, human requirements, senior management support) to simplify the work procedures dimensions (modern procedures, clarity of procedures, short procedures, availability of information and means required. The simplicity of the models used because of its importance to keep abreast of recent developments in the service of municipal works through the application of electronic data interchange, which simplifies procedures and out of the routine in the performance of the work of municipal departments has developed. It was applied to Municipality (Hilla) so that the transformation
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show Moreعانت الغابات في العراق قصوراً واضحاً في مجال إشباع حاجة السكان لمنتجاتها الرئيسية المتمثلة بالأخشاب ومنتجاتها الثانوية المتمثلة بالأغصان والأوراق والنباتات الطبيعية والحيوانات البرية ونواتجها الأخرى، مما يتطلب التفكير بمحاولة إيجاد سبل جديدة لحل هذه المشكلة الاقتصادية المرتبطة بعنصريها الحاجة للأخشاب والأموال المخصصة لتطويرها عموماً.
لقد دمرت مساحات كبيرة من الغابات وحرقت وقطعت من
... Show MoreIn the present study, a powder mixture of elements Ti and Ni was mechanically alloyed in a high energy ball mill. Microstructure of the nanosized amorphous milled product in different stages of milling has been characterized by X- ray diffraction, scanning electron microscopy and differential thermal analysis. We found that time of mechanical alloying is more significant to convert all crystalline structure to the amorphous phase. Nanocrystalline phase was achieved as a result of the mechanical alloying process. The results also indicates that the phase transformation and the grain size occurs in these alloys are controlled by ball milling time
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe present work reports on the performance of three types of nanofiltration membranes in the removal of highly polluting and toxic lead (Pb2+) and cadmium (Cd2+) from single and binary salt aqueous solutions simulating real wastewaters. The effect of the operating variables (pH (5.5-6.5), types of NF membrane and initial ions concentration (10-250 ppm)) on the separation process and water flux was investigated. It was observed that the rejection efficiency increased with increasing pH of solution and decreasing the initial metal ions concentrations. While the flux decreased with increasing pH of solution and increasing initial metal ions concentrations. The maximum rejection of lead and cadmium ion
... Show More