The road transportation system is considered as major component of the infrastructure in any country, it affects the developments in economy and social activities. The Asphalt Concrete which is considered as the major pavement material for the road transportation system in Baghdad is subjected to continuous deterioration with time due to traffic loading and environmental conditions, it was felt that implementing a comprehensive pavement maintenance management system (PMMS), which should be capable for preserving the functional and structural conditions of pavement layers, is essential. This work presents the development of PMMS with Visual inspection technique for evaluating the Asphalt Concrete pavement surface condition; common types of Asphalt Concrete distress including (bleeding of Asphalt, patching, block cracking, edge cracking, longitudinal and transverse cracking, rutting, pot holes, longitudinal and transverse deformation) with their various severity and intensity conditions have been included in the system as data base. The surface of the pavement was divided into sections, and the pavement condition is visually evaluated by the raters using specially designed forms, each type of defect was measured, classified, and rated according to type, severity, and extent. Data will be fed to the system using the computer, various types of intensity and severity of distress were analyzed by the system, the present condition rating (PCR) of the pavement section is determined, and the system suggests the required maintenance action. The developed system which is assigned (PMMS-09) was verified in evaluating the pavement surface condition at AL-Jaderiah campus roadway network. The results indicated that the system is sound in evaluation of the pavement condition and in suggestion of the proper maintenance to reserve the pavement condition.
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreFor many years, the construction industry damages have been overlooked such as unreasonable consumption of resources in addition to producing a lot of construction waste but with global awareness growth towards the sustainable development issues, the sustainable construction practices have been adopted, taking into account the environment and human safety. The research aims to propose a management system for construction practices which could be adopted during constructing different types of sustainable buildings besides formulating flowcharts which clarify the required whole phases of sustainable buildings life cycle. The research includes two parts: theoretical part which generally ,handles the sustainability concepts at construction i
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Millions of pilgrims and visitors from numerous parts of the world flock to Karbala (one of the most prominent ideological and religious places in central Iraq) each year to visit the holy shrines in Karbala due to their sanctity. Many improvements have been made to the Two Holy Shrines (THS), the Shrines of Imam Husayn and Imam Abbas, and the area between them (ATHS), due to the high temperatures in this region and to improve pedestrian thermal comfort. Studies on improving outdoor thermal comfort in Karbala are scarce. Hence, this research aims to look into historical and current architectural changes and how they affect thermal comfort. On the hottest summer day, the ENVI-met software program was used to simulate the building des
... Show MoreMillions of pilgrims and visitors from numerous parts of the world flock to Karbala (one of the most prominent ideological and religious places in central Iraq) each year to visit the holy shrines in Karbala due to their sanctity. Many improvements have been made to the Two Holy Shrines (THS), the Shrines of Imam Husayn and Imam Abbas, and the area between them (ATHS), due to the high temperatures in this region and to improve pedestrian thermal comfort. Studies on improving outdoor thermal comfort in Karbala are scarce. Hence, this research aims to look into historical and current architectural changes and how they affect thermal comfort. On the hottest summer day, the ENVI-met software program was used to simulate the building des
... Show MoreToday, the prediction system and survival rate became an important request. A previous paper constructed a scoring system to predict breast cancer mortality at 5 to 10 years by using age, personal history of breast cancer, grade, TNM stage and multicentricity as prognostic factors in Spain population. This paper highlights the improvement of survival prediction by using fuzzy logic, through upgrading the scoring system to make it more accurate and efficient in cases of unknown factors, age groups, and in the way of how to calculate the final score. By using Matlab as a simulator, the result shows a wide variation in the possibility of values for calculating the risk percentage instead of only 16. Additionally, the accuracy will be calculate
... Show MoreBeen using a pv system program to determine the solar window for Baghdad city . the solar window for any location can be determine by deviating left and right from the geographical south as well as deviation according to the amount of tilt angle with the horizon for fixed panel so that will not change the average of solar radiation incident over the whole year and this lead to help in the process of installation of fixed solar panel without any effect on annual output .the range of solar window for Baghdad city between two angles ( -8 - +8 ) degrees left to right of the geographical south and tilt angle that allowed for the horizon range between angles (21- 30) degrees so that the amount of solar radiation that falling on the solar pan
... Show More