Preferred Language
Articles
/
joe-1024
Influence of Liquid Asphalt on Resilient Modules and Permanent Deformation of Recycled Asphalt Concrete
...Show More Authors

Tests were performed on Marshall samples and were implemented for permanent deformation and resilient modulus (Mr) under indirect tensile repeated loading (ITRL), with constant stress level. Two types of liquid asphalt (cutback and emulsion) were tried as recycling agents, aged materials that were reclaimed from field (100% RAP), samples were prepared from the aged mixture, and two types of liquid asphalt (cutback and emulsion) with a weight content of 0.5% were utilized to prepare a recycled mixture. A group of twelve samples was prepared for each mixture; six samples were tested directly for ITRL test (three samples at 25˚C and three samples at 40˚C), an average value for ITRL for every three samples was calculated (ITRL for unconditioned samples). The other six samples were placed in volumetric flask 4000-ml heavy- wall glass filled with water at 25˚C under a vacuum pressure of (3.74 kPa) for 5 to 10 minutes. Then the samples were put in deep freeze for 16 hours at -18˚C. The samples were frozen then were transported to a water bath at 60ºC for 24 hours. Then they were soaked in a water bath for 1 hour at 25ºC and tested for the ITRL test (three samples at 25˚C and three samples at 40˚C), the average value of ITRL for every three samples was calculated (ITRL for conditioned samples). It was concluded that the reduction in (Mr) at the Conditioned test as compared to the Unconditioned test was (29.5%, 22.27% and 9.09%) at 25˚C, while at 40˚C, the reduction was (21.28%, 15.53%, and 17.89%) for aged and recycled mixtures with (cutback), and (emulsion) respectively. The change in permanent deformation at the Conditioned test as compared to Unconditioned one was (76.19%, 75.61% and 53.22%) at 25˚C, while at 40˚C it was (56.48%, 35.19%, and 78.33%) for aged and recycled mixtures with (cutback), and (emulsion) respectively.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
Sumer Journal For Pure Science
COVID-19Disease Diagnosis using Artificial Intelligence based on Gene Expression: A Review
...Show More Authors

Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
...Show More Authors

     The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 15 2013
Journal Name
Journal Of Kerbala University 11 (3)ā€¸
Effect ofchemicalfertilizerand foliar spray ofgibberellicacidon mineral element andgibberellin-likesubstances content on someolivecultivarsā€¸
...Show More Authors

Publication Date
Fri Feb 05 2021
Journal Name
Research In Intelligent And Computing In Engineering
Implementing Web Testing System Depending on Performance Testing Using Load Testing Method.
...Show More Authors

Web testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t

... Show More
Publication Date
Tue Nov 01 2022
Journal Name
Aci Structural Journal
Stress at Ultimate in Internally Unbonded Steel Based on Genetic Expression Programming
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
An Optimal Method for Supply Chain Logistics Management Based on Neural Network
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Oct 23 2021
Journal Name
Iraqi Journal Of Physics
Thin Film Dye Laser Based on BBQ Doped Poly (Methyl Meth-Acrylate)
...Show More Authors

This paper reports on the laser emission properties of the BBQ dye in poly (methyl meth-acrylate)(PMMA). This host material combines the advantages of an organic environment for dye with the thermoptical mechanical properties of an organic dye. A BBQ dye solid solution in PMMA polymer. A nitrogen laser in untuned laser cavity has pumped thin films. We developed the concentration and the thickness to get high efficiency. The laser efficiency had been increased from 7% at thickness 1.5 m to 16.5% at thickness 3.5m, and from 1% to 10% when concentration increased from 1x10-5M to 1x10-3 M

View Publication Preview PDF
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Watershed Transform Based on Clustering Techniques to Extract Brain Tumors in MRI
...Show More Authors

In this work, watershed transform method was implemented to detect and extract tumors and abnormalities in MRI brain skull stripped images. An adaptive technique has been proposed to improve the performance of this method.Watershed transform algorithm based on clustering techniques: K-Means and FCM were implemented to reduce the oversegmentation problem. The K-Means and FCM clustered images were utilized as input images to the watershed algorithm as well as of the original image. The relative surface area of the extracted tumor region was calculated for each application. The results showed that watershed trnsform algorithm succeedeed to detect and extract the brain tumor regions very well according to the consult of a specialist doctor a

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte

... Show More
View Publication Preview PDF