The splicing design of the existing road and the new road in the expansion project is an important part of the design work. Based on the analysis of the characteristics and the load effect of pavement structure on splicing, this paper points out that tensile crack or shear failure may occur at the splicing under the repeated action of the traffic load on the new/old pavement. According to the current structure design code of asphalt pavement in China, it is proposed that the horizontal tensile stress at the bottom of the splicing layer and the vertical shear stress at other layers of the splicing line should be controlled by adjusting the position and size of the excavated steps in addition to the conventional design index, and put forward the corresponding technical requirements and design process. It can be used for reference in the design of asphalt pavement reconstruction and expansion projects.
Nanoparticle has pulled in expanding consideration with the developing enthusiasm for nanotechnology which hold potential as essential segments for development applications. In the present work, a copper nanoparticle is manufactured as a suspension in distilled water by beating a bulk copper target with laser source (532 nm wavelength, 10 ns pulse duration and 10 Hz repletion rate) via method. UV- visible absorption spectra and AFM analysis has been done to observe the effect of repetition rate for the pulsation of laser. Copper nanoparticles (Cu-NPs) were successfully synthesized with green color. The Cu- NPs have very high purity because the preparation was managed in aqueous media to eliminate ambient contaminations. Absorption
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreAn efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show MoreThe transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreThe research addresses the importance of reading and writing for sura Al-alaq and Al-qalam as they represent the main sources for all the sciences as well as ethical values. The researcher seeks to define the educational and ethical values in these two texts which related to reading and writing. To do this, the author went through different relevant literature to show the similarities and related points between them, she also shows the significant of reading and writing and the learning and teaching worth to be consider. The result revealed that the both texts assert on the educational and ethical values, and the vital role of reading and writing.
We study in this paper the composition operator of induced by the function ?(z)=sz+t where , and We characterize the normal composition operator C? on Hardy space H2 and other related classes of operators. In addition to that we study the essential normality of C? and give some other partial results which are new to the best of our knowledge.