Preferred Language
Articles
/
joe-1565
Permanent Deformation Characterization of Stone Matrix Asphalt Reinforced by Different Types of Fibers
...Show More Authors

This paper focused on the stone matrix asphalt (SMA) technology that was developed essentially to guard against rutting distress. For this procedure, fibers play a racy role in stabilizing and preventing the drain down problem caused by the necessity of high binder content coupled with their strengthening effect. A set of specimens with cylindrical and slab shapes were fabricated by inclusions jute, polyester, and carbon fibers. For each type, three contents of 0.25%, 0.5%, and 0.75% by weight of mixture were added by lengths of 5, 7.5, and 10 mm. The prepared mixtures were tested to gain the essential pertained parameters discriminated by the values of drain down, Marshall quotient, rut depth, and dynamic stability. It has appeared that the fibers rate of 0.5% and 7.5 mm length is much appropriate to yield the best performance of modified mixtures. At these values, carbon fibers recorded the highest increase level of rutting resistance and dynamic stability by 53% and 100%, respectively while, jute fibers exhibited the lowest improvement by only 34% and 63%, respectively; nevertheless, they produced mixtures having the lowest drain down value. Regarding the index of plastic stiffness, polyester fibers embedded mixtures occupied the first rank of increasing by 38%.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
WISDOM AND ITS CAUSE BY FUNDEMENTALISTS
...Show More Authors

Allah's wisdom has necessitated concentrating un human nature the ability of
mediation and forethought .among the aspect of this ability is the recognition of the
relationship between causes and effects issues and reasons behind them and the
sensing of similarities and differences and distinguish the connection between the
subjects and characteristics and the innate perception of material and immaterial good
and bad.
Allah's wisdom has willed not to make his law away from the nature of people of
discovering the relationship between things and their causes, or similarity between
things and their counterparts to use the Quranic text to convince reason and to enable
reason to realize the wisdom quranic text within

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 14 2025
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Hydrodesulfurization of Iraqi Atmospheric Gasoil by Ti-Ni-Mo/γ-Al2O3 Prepared Catalyst
...Show More Authors

This study investigates the improvement of Iraqi atmospheric gas oil characteristics which contains 1.402 wt. % sulfur content and 16.88 wt. % aromatic content supplied from Al-Dura Refinery by using hydrodesulfurization (HDS) process using Ti-Ni-Mo/γ-Al2O3 prepared catalyst in order to achieve low sulfur and aromatic saturation gas oil. Hydrodearomatization (HDA) occurs simultaneously with hydrodesulfurization (HDS) process. The effect of titanium on the conventional catalyst Ni-Mo/γ-Al2O3 was investigated by physical adsorption and catalytic activity test.Ti-Ni-Mo/γ-Al2O3 catalyst was prepared under vacuum impregnation condition to ensure efficient pr

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Calculations For Sputtering Yield of Nickel Surface Hitted By Xenon Plasma Ions
...Show More Authors

Extended calculations for sputtering yield through bombed Nickel – target by Xenon ions plasma are accomplished. The calculations include changing the input parameters: the energy of xenon ions plasma, the hit target angle of nickel target, thickness of the nickel target layer, and the slight change in the surface binding energy of Nickel. The program TRIM is used to accomplish these calculations. The results show that the sputtering yields directly dependent on these parameters. The change in angles of incidence plasma ions and energy leads to a significant change in the sputtering yields. On the other hand, the sputtering yields ore highly affected by changing target width and surface binding energy at fixed ion parameters.

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DETECTION OF SUBSURFACE CAVITIES BY THE ELECTROMAGNETIC METHOD (Case Study at Haditha Area)
...Show More Authors

Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
The Education Faculty Journal Of Baghdad University
Analyzing the Rhetorical Structure of Linguistics Dissertation Abstracts Written by Iraqi EFL Graduates
...Show More Authors

Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Stellar Thermonuclear Reaction Rates of Proton Radiative Capture by Closed Light Shell Isotopes
...Show More Authors

Light isotopes, especially closed shell nuclei, have significance in thermonuclear reactions of the Carbon-Nitrogen-Oxygen (CNO) cycle in stars. In this research, 12C(p, γ) 13N and 14N(p, γ) 15O reactions have been calculated by means of Matlab codes to find the reaction rate across a temperature range of 0.006 to 10 GK using non-resonant parts, as well as the astrophysical S- factor S(E) at low energies. It was concluded that the high binding energy of 12C and 14N nuclei make the reaction less probable thus enabling other competitive processes to develop, which enhances the probability of other competitive proton reactions in the CNO cycle.

View Publication
Scopus Crossref
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Extraction of Penicillin V from Simulated Fermentation Broth by Liquid-Liquid Membrane Technique
...Show More Authors

Liquid-liquid membrane extraction technique, pertraction, using three types of solvents (methyl isobutyl ketone, n-butyl acetate, and n-amyl acetate) was used for recovery of penicillin V from simulated fermentation broth under various operating conditions of pH value (4-6) for feed and (6-8) for receiver phase, time (0-40 min), and agitation speed (300-500 rpm) in a batch laboratory unit system. The optimum conditions for extraction were at pH of 4 for feed, and 8 for receiver phase, rotation speed of 500 rpm, time of 40 min, and solvent of MIBK as membrane, where more than 98% of penicillin was extracted. 

View Publication Preview PDF