With the increase in industry and industrial products, quantities of waste have increased worldwide, especially plastic waste, as plastic pollution is considered one of the wastes of the modern era that threatens the environment and living organisms. On this basis, a solution must be found to use this waste and recycle it safely so that it does not threaten the environment. Therefore, this research used plastic waste as an improvement material for clay soil. In this research, two types of tests were conducted, the first of which was a laboratory test, where the undrained shear strength (cohesion), compression index (Cc), and swelling index (Cr) of the improved and unimproved soils were calculated (plastic was added in proportions (0.5, 1, 1.5, 2)%. The second part of the examination was done through physical modeling, where 2% of plastic was used, considered the optimal percentage in this research, and the calculation of the carrying capacity-settlement relationship for both the improved and unimproved soils. Using this percentage of plastic showed an improvement in the relationship between the bearing capacities of soil vs. subsidence, as an increase in the amount of stress was observed from 405 KPa to 459 kPa at 10% of subsidence.
This paper aims to study the rate of star formation (SFR) in luminous infrared galaxies at different wavelengths using distance measurement techniques (dl, dm) and to know which methods are the most accurate to determine the rate of star formation as we present through this research the results of the statistical analysis (descriptive statistics) for a sample of luminous infrared galaxies. The data used in this research were collected from the NASA Extragalactic Database (NED) and HYPERLEDA, then used to calculate the star formation rate and indicate the accuracy of the distance methods used (dl, dm). Two methods were tested on Hα, OII, FIR, radio continuum at 1.4 GHz, FUV, NUV, and total (FUV + FIR). The results showed that the dl
... Show MoreIn this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.
Hemorrhoids are one of the most common surgical conditions. The hemorrhoid may cause symptoms that are: bleeding, pain, prolapse, itching, spoilage of feces, and psychologic discomfort. There are many methods for treatment of hemorrhoid like, medical therapy, rubber band ligation, electerocoagulation, stapled hemorrhoidpexy, photocoagulation, sclerothereapy, doppler guided artery ligation, Cryosurgery, and surgery. All methods for treatment of hemorrhoids have advantages, disadvantages, and limitations. Conventional haemorrhoidectomy was the traditional operation for the treatment of hemorrhoids. But recently other modalities of treatment had been used as an alternative operations including CO2 laser haemorrhoidectomy. This work aims to
... Show MoreThis paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.
The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show MoreThe research deals with Environmental Management and how to develop its programs with the use of Knowledge Management, the environmental programs that integrate with processes can add strategic value to business through improving rates of resource utilization , efficiencies , reduce waste, use risk management, cut costs, avoid fines and reduce insurance. All these activities and processes can improve it through knowledge management, the optimal usage for all organizations information , employ it in high value and share it among all organizations members who involves in modify its strategy . Choosing suitable environmental management information system, develop it and modify it with organization processes, can greatly serve the en
... Show MoreThis paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreThe purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general