The precipitation of calcite induced via microorganisms (MICP) is a technique that has been developed as an innovative sustainable ground improvement method utilizing ureolytic bacteria to soil strengthening and stabilization. Locally isolated Bacillus Sonorensis from Iraqi soil samples were found to have high abilities in producing urease. This study aims to use the MICP technique in improving the undrained shear strength of soft clay soil using two native urease producing bacteria that help in the precipitation of calcite to increase the cementation between soil particles. Three concentrations of each of the locally prepared Bacillus sonorensis are used in this study for cementation reagent (0.25M, 0.5M, and 1M) during the period of treatment. The results showed that the native isolated bacteria have high activity in bindings the soil particles together. The results of unconfined compressive strength tests showed that using MICP helps increase the undrained shear strength of soil by (3-5 times) for C11 types of native isolates, but the D11 was (1.5-2 times) because two types have different activity. This study's main finding is using the native urease-producing bacteria isolated from Iraqi soil in the MICP technique for the biocementation of soil, which is considered one of the sustainable techniques in the construction industry.
The increase in the number of trucks and other heavy vehicles in Iraqi highways lead to cracking and deteriorations in the flexible highway. The use of polymermodified asphalt may solve this problem to match the required performance standards. This study investigates the effects of styrene-butadiene-styrene (SBS) polymer on the performance behaviour of Iraqi bitumen binder. The characteristics of bitumen binder were analysed to observe the compatibility of bitumen with SBS polymer. The bitumen binder was mixed with three different contents of SBS (4%, 4.5%, and 5%) by weight of asphalt cement. Viscosity tests were conducted on the SBS polymer-modified asphalt at 135 oC and 165 oC in addition to conventional binder tests. The prepar
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreIn this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.
First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .
&nbs
... Show MoreThe purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More