The using of recycled aggregates from construction and demolition waste (CDW) can preserve natural aggregate resources, reduce the demand for landfill, and contribute to a sustainable built environment. Concrete demolition waste has been proven to be an excellent source of aggregates for new concrete production. At a technical, economic, and environmental level, roller compacted concrete (RCC) applications benefit various civil construction projects. Roller Compacted Concrete (RCC) is a homogenous mixture that is best described as a zero-slump concrete placed with compacting equipment, uses in storage areas, dams, and most often as a basis for rigid pavements. The mix must be sufficiently dry to support the weight of vibratory machinery while still being sufficiently moist to enough paste binder dispersion throughout the mass for efficient compaction. Limited studies into the use of RCC with fine recycled aggregate not from pavements are figured. This study aims to see how well-recycled concrete aggregates (RCA) perform in RCC mixtures. Also how well waste concrete could be used as a fine and coarse aggregate substitute in roller-compacted concrete pavement mixes, to create a good concrete mix in both wet and firm phases. The test results of mechanical properties showed 10% RCA is similar to those in the reference mix in the compressive strength, a 100% RCA ratio reduces compressive strength by almost 30%. Comparing Reference mix and Recycled concrete by 30% replacement, the compressive strength drops by just 6% when the RCA ratio is 30%.
The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slun
... Show MoreTo investigate the prevalence of true periodontal chief complaints (CC) and the factors affecting their reporting by patients with periodontal diseases (PD).
This cross‐sectional study was based on retrospective analysis of available periodontal records. Different personal and demographic variables were obtained from these records including CC, age, gender, working status, past medical/dental history, smoking status and diagnosis. In addition, clinical parameters of plaque index, gingival index, probing pocket depth (PPD), and number of missing teeth. Periodontal CC were r
Background:This is a prospective study of three children presented to us in the Orbital clinic in AL ShahidGazi Al Hariri Hospital with painless proptosiswith suspension of Hydatid disease.Objectives: : Orbital hydatid disease is a rare lesion accounting for less than 1% of the total lesions of the body (1, 2). Orbital cysts presented as a primary lesion in our study which is rare to have such lesion without involvement of other organs (3). Humans represent the intermediate host where the commonly affected organ are liver and the lung (10-15%) (4). Methods:This is a prospective study of three Children presented to us in the Orbital clinic in Al Shahid Ghazi Alhariri Hospital with painless proptosis with suspension of Hydatid disease, dep
... Show MoreBackground: Increasing interest in quality of life (QoL) is the new approach for understanding and improvement of health care. Although there are many studies about quality of life, there is deficiency of data about quality of life of peoples survived from terroristic explosions.Objectives: To study the QoL for peoples survived from terroristic explosions and compare it with that of a controlled people. Methods: This study was conducted between, 1st of July till 31st of December 2013. The sample of this study was collected from peoples attending the outpatient clinics in four primary health care centers, Baghdad city (2 from Rusafa and 2 from Karkh). 183 individuals proved to be exposed to terroristic explosion and 199 individual not exp
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreThe complexity and variety of language included in policy and academic documents make the automatic classification of research papers based on the United Nations Sustainable Development Goals (SDGs) somewhat difficult. Using both pre-trained and contextual word embeddings to increase semantic understanding, this study presents a complete deep learning pipeline combining Bidirectional Long Short-Term Memory (BiLSTM) and Convolutional Neural Network (CNN) architectures which aims primarily to improve the comprehensibility and accuracy of SDG text classification, thereby enabling more effective policy monitoring and research evaluation. Successful document representation via Global Vector (GloVe), Bidirectional Encoder Representations from Tra
... Show MoreTrajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of
... Show More