Preferred Language
Articles
/
joe-433
Resistance to Moisture Damage of Recycled Asphalt Concrete Pavement
...Show More Authors

Recycled asphalt concrete mixture are prepared, artificially aged and processed in the laboratory to maintain the homogeneity of recycled asphalt concrete mixture gradation, and bitumen content. The loose asphalt concrete mix was subjected to cycle of accelerated aging, (short –term aging) and the compacted mix was subjected to (long -term aging) as per Super-pave procedure. Twenty four Specimens were constructed at optimum asphalt content according to Marshall Method. Recycled mixture was prepared from aged asphalt concrete using recycling agent (soft asphalt cement blended with silica fumes) by (1.5%) weight of mixture as recycling agent content. The effect of recycling agent on aging after recycling process behavior of asphalt concrete was determine. Aged specimens after recycling process were prepared by subjecting the recycled asphalt concrete to accelerated aging and tested for resistance to moisture damage. The improvement in the resistance to moisture damage of aged mixture after recycling with (soft asphalt cement blended with silica fumes) was 76.17% as compared to the corresponding aged mixture before recycling process. The ITS for unconditioned specimens for aged after recycling process mixture was less than reference by 67.1%, and less than that of aged before recycling process mixtures by 64.1%.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Baghdad College Of Dentistry
Management of trauma to the anterior segment of the maxilla: alveolar fracture and primary incisors crown and root fracture
...Show More Authors

Background: An injury to both the primary and permanent teeth and the supporting structures is one of the most common dental problems seen in children. Splinting is usually difficult or impossible to perform in the primary dentition (due to diminutive room size and lack of patient cooperation). Healing must, therefore, occur despite mobility at the fracture line, usually resulting in interposition of connective tissue. In some instances, infection will occur in the coronal pulp. The present study reported a case of trauma to the anterior primary teeth and alveolar bone in a four year old child. The trauma has caused fracture to the crowns and roots of the primary anterior teeth. The following case was managed in a procedure that may prov

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 06 2020
Journal Name
Bmc Oral Health
The reliability of surgeons to avoid traumatic insertion of dental implants into high-risk regions: a panoramic radiograph study
...Show More Authors
Abstract<sec> <title>Background

The posterior regions of the jaws usually represent a significant risk for implant surgery. A non-valid assessment of the available bone height may lead to either perforation of the maxillary sinus floor or encroachment of the inferior alveolar nerve and consequently to implant failure. This study aimed to evaluate the reliability of surgeon’s decision in appraising the appropriate implant length, in respect to vital anatomical structures, using panoramic radiographs.

Methods

Only implants that are inserted in relation to the maxillary sinus (MS) or the mandibular canal (MC) were enrolled

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
the role of senior management commitment to total quality in the implementation of knowledge management processes_Asurvey of asample of civil colleges
...Show More Authors

Occupies total quality management applications play a key role in the development of institutions of higher education performance and achieve its strategic objectives through the commitment of senior management and their employees to continuous improvement of the quality of performance in the various areas of work, and can be integrated knowledge management processes, which means identifying information of value and how to take advantage. The data were collected using the style of the questionnaire for the purpose of analyzing their results on a sample composed of 83 member of the administrative leadership in colleges as representing the decision-making centers in those colleges . 

  &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
The Degree of Application of Digital Leadership and its Relationship to the Development of Administrative Work at the University of Tabuk
...Show More Authors

This study aims to explore the relationship between the degree of application of digital leadership and the development of administrative work at the University of Tabuk. It further aims to examine the presence of statistically significant differences between the average responses of faculty members and employees at the University of Tabuk regarding the study axes that are attributed to the following variables: (scientific rank, gender, and job), the study used the descriptive approach in its correlative style, and the questionnaire was used as a tool for data collection, as it was applied to a simple random of (310) members of the faculty and staff. University of Tabuk. The results showed that the degree of digital leadership applicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Proposal of Using Principle of Maximizing Entropy of Generalized Gamma Distribution to Estimate the Survival probabilities of the Population in Iraq
...Show More Authors

In this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Iraq public exposuring to foreign satellites and its effect on the cultural identity
...Show More Authors

The summary of this study is to identify the relation ship between exposuing of the
public to foreign satellites and the degree of cultural of Iraqi public . the danger Iraqi public
exposure to foreign satellite specially some groups of the public are still own limited culture
and ideology without enough conscious to attitude of society . such people cun easily be
controlled by satellites , because these satellites may be the only cultural source for them
which may badly affect their behaviour . This study also aims to identify the level of Iraqi
people exposure to foreign satellites and the types and motivations of that exposure , then to
realize the relationship between exposing to foreign satellites and the cultur

... Show More
View Publication Preview PDF