Roller Compacted Concrete is a type of concrete that is environmentally friendly and more economical than traditional concrete. Roller Compacted Concrete is typically used for heavy-duty and specialist constructions, such as hydraulic structures and pavements, because of its coarse surface. The main difference between RCC and conventional concrete mixtures is that RCC has a more significant proportion of fine aggregates that allow compaction and tight packing. In recent years, it has been estimated that several million tons of waste demolished material (WDM) produced each year are directed to landfills worldwide without being recycled for disposal. This review aimed to study the literature about creating a Roller-Compacted Concrete (RCC) mix with modified engineering properties with favorable environmental impact, so it was focused on investigating using different proportions of waste (Glass, Brick, and Marble), which are the most waste-demolished materials (WDM) widely in the world, as a partial substitute of cement. Then, study the influence on the durability and mechanical strength of (RCC) produced with and without these waste powders.
The increasing drinking water demand in many countries leads to an increase in the use of desalination plants, which are considered a great solution for water treatment processes. Reverse osmosis (RO) and electro-dialysis (ED) systems are the most popular membrane processes used to desalinate water at high salinity. Both systems work by separating the ionic contaminates and disposing of them as a brine solution, but ED uses electrical current as a driving force while RO uses osmotic pressure. A direct comparison of reverse osmosis and electro-dialysis systems is needed to highlight process development similarities and variances. This work aims to provide an overview of previous studies on reverse osmosis and electro-dial
... Show MoreThe current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreThis paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.
In many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show More