Aging of asphalt pavements typically occurs through oxidation of the asphalt and evaporation of the lighter maltenes from the binder. The main objective of this study is to evaluate influence of aging on performance of asphalt paving materials.nAsphalt concrete mixtures, were prepared, and subjected to short term aging (STA) procedure which involved heating the loose mixtures in an oven for two aging period of (4 and 8) hours at a temperature of 135 o C. Then it was subject to Long term aging (LTA) procedure using (2 and 5) days aging periods at 85 o C for Marshall compacted specimens. The effect of aging periods on properties of asphalt concrete at optimum asphalt content such as Marshall Properties, indirect tensile strength at 25 o C, Resilient Modulus and resistance to permanent deformation were evaluated. The impact of Short-term and long-term aging on asphalt concrete properties was evaluated. The stiffness of the mixture increases by increasing aging period that lead to increase of Marshall Stability, indirect tensile strength, and the resilient modulus, which leads to increases the resistance of mixtures against permanent deformation. The 8 hr. short term aging causes the Marshall stability, indirect tensile strength at 25 o C and resilient modulus to be increased by 52%, 34 % , 20% respectively as compared with control mixture while, the permanent deformation decreased by (33 %) as compared with control mixture.
The use of ultraviolet rays is one of the methods of treating surface contamination of many foods especially pickles. however, there are some side effects to its use, especially in high percentage oil food products, it is necessary to determine the appropriate doses and time periods to avoid deterioration of its oil physicochemical characteristics. this study was conducted to see the effect of ultraviolet rays 15W on some chemical properties of olive oil when using it to preserve green olive pickles, treated for 5, 10 and 15 min daily. green olive fruits Iraqi variety (al-ashrasi), in season (2020-2021) were pickled using Spanish style, the best time period to pr
... Show MoreAbstract
The current research aims to examine the effect of the Adi and Shayer model on the achievement of fifth-grade students and their attitudes toward history. To achieve the research objective, the researcher has adopted two null hypotheses. 1) there is no statistically significant difference at the level of (0.05) between the average score of students of the experimental group who study the history of Europe and modern American history according to the model of Addie and Shayer, and the average scores of the students of the control group who study the same subjects according to the traditional method in the test of post-achievement. 2) There was no statistically significant difference at the level (
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show More