This article aims to establish and evaluate standards for critical equipment and materials in highway projects in Iraq. Delphi technique has been used to analyze, explore, and discover the main criteria and sub-criteria that affect equipment and materials in highway construction projects in Iraq. To determine the correct response to the criteria presented in this study, a program (IBM, SPSS/V25) was used to assess the main criteria and sub-criteria using the mean score (MS) and standard deviation (SD) technique, as well as to check reliability using Cronbach's alpha factor (α). The experts' qualifications and the extent to which the person is ready to commit are both important factors in panel selection. The design of a questionnaire, which is also identified as questions or repetitions, is based on a clear identification of study objectives, a literature review, and other primary research activities. By applying the Delphi technique steps and procedures, this research reveals fifteen (15) successful criteria in equipment and materials in highway construction projects in Iraq.
The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
The study deals with 3D seismic reflection in the central Iraq within Merjan oil field which is located approximately (130 km) to the southwest Baghdad and south of Razaza. The 3D seismic survey was interpreted; the results showed that the oil is found within Hartha Formation as stratigraphic traps and with the absence of structural traps. The major normal faults picked are trending N-S direction. There are also minor faults observed using the instantaneous phase and frequency sections, they proved the presence of the faults and showed that the ending of the Safawi reflector toward the north and northeast to the south and southeast and near the western border of fault because of the facies change in the area. The reflector shows a struct
... Show MoreThis paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.
Ground penetrating radar (GPR) technology is used to determine the extent to which this technique can detect with a high-frequency range from 10 MHz to 1000 MHz into the ground by a transmitting antenna and A graveyard was found beneath the depth of the three meters under Surface of the earth in the shrine of the Prophet Houd and Saleh in Al-Najaf Governorate surveyed by through 4 tracks. Ground Penetrating Radar (GPR) is a device that transmits short pulses of electromagnetic energy with pulse duration about 1 ns to 20 ns. applying the filter Time- Zero to the same profile at a depth (3m) , Two types of antennas were used in this study, with two different frequencies antennas (250, 500 )MHz Three tracks (23,25,2
... Show MoreIn the present work a theoretical analysis depending on the new higher order . element in shear deformation theory for simply supported cross-ply laminated plate is developed. The new displacement field of the middle surface expanded as a combination of exponential and trigonometric function of thickness coordinate with the transverse displacement taken to be constant through the thickness. The governing equations are derived using Hamilton’s principle and solved using Navier solution method to obtain the deflection and stresses under uniform sinusoidal load. The effect of many design parameters such as number of laminates, aspect ratio and thickness ratio on static behavior of the laminated composite plate has been studied. The
... Show MoreIn this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.
Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.
Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
Let R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More