Preferred Language
Articles
/
joe-479
Reinforcement of Asphalt Concrete by Polyester Fibers to Improve Flexural Bending Fatigue Resistance
...Show More Authors

Reinforcing asphalt concrete with polyester fibers considered as an active remedy to alleviate the harmful impact of fatigue deterioration. This study covers the investigation of utilizing two shapes of fibers size, 6.35 mm by 3.00 mm and 12.70 mm by 3.00 mm with mutual concentrations equal to 0.25 %, 0.50 % and 0.75 % by weight of mixture. Composition of asphalt mixture consists of different optimum (40-50) asphalt cement content, 12.50 mm nominal aggregate maximum size with limestone dust as a filler. Following the traditional asphalt cement and aggregate tests, three essential test were carried out on mixtures, namely: Marshall test (105 cylindrical specimens), indirect tensile strength test (21 cylindrical specimens) and flexural bending test (21 beam specimens). The results revealed that, more asphalt content needed as the fibers length and concentration increased. The fatigue life estimation depending on cyclic load to failure in the beam test support the idea that polyester fibers really improve the resistance of fatigue cracking since the repetitions to failure increased by 9.40 % for the 0.50 % of 12.70 mm fibers length. Both of Marshall stability and indirect tensile strength suffer from slight reduction in their values, whereas, the 0.75 % of 12.70 mm fibers length caused lowering in Marshall stability and indirect tensile strength by 11.70 % and 6.00 % respectively.

 

View Publication
Publication Date
Mon Apr 03 2023
Journal Name
Aro-the Scientific Journal Of Koya University
The Most Common Characteristics of Fragile Video Watermarking
...Show More Authors

The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Non-Parametric Quality Control Methods
...Show More Authors

    Multivariate Non-Parametric control charts were used to monitoring the data that generated by using the simulation, whether they are within control limits or not. Since that non-parametric methods do not require any assumptions about the distribution of the data.  This research aims to apply the multivariate non-parametric quality control methods, which are Multivariate Wilcoxon Signed-Rank ( ) , kernel principal component analysis (KPCA) and k-nearest neighbor (

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 02 2025
Journal Name
Al-nahrain Journal For Engineering Sciences
Optimum Height of Plate Stiffener under Pressure Effect
...Show More Authors

The economical design of plate loaded by pressure can be obtained by using stiffeners instead of increasing the thickness of plate. The main subject of this work is to obtain the effect of stiffener height on the maximum stress in the plate subjected to pressure load. Different plate-stiffener sets are selected to find the effects of stiffener thickness, plate dimensions and pressure, on the optimum stiffener height. The models under consideration are square plates clamped rigidly from four edges. Finite Element method is used to analyze 160 different models by using the Finite Element software package ANSYS version 11. Another analysis method based on maximum stress equation is used to analyze 30 models. The graphical comparison of results

... Show More
View Publication
Publication Date
Fri May 01 2015
Journal Name
Journal Of Hazardous Materials
The removal of caesium ions using supported clinoptilolite
...Show More Authors

View Publication
Scopus (31)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
Fantasy Parody in the Design of the Advertisement
...Show More Authors

This research deals with the topic (Fantasy Parody in the Design of the Advertisement) in view of the important role that fantasia plays in designing the most creative and attractive advertisements to the recipients. The research problem lies in accordance with the following question:
What is the Fantasy Parody in the Design of the Advertisement?
It means the imagination, the unfamiliar; and features that emerge for it that distinguish it from other concepts. Fantasy advertisement is creativity in innovative ways, either through collage, merging, or the use of various artistic expressions in terms of intellectual and cultural awareness. When uses in the parody of advertisement, it has helped to come up with an aesthetic experie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 09 2009
Journal Name
University Of Baghdad
Estimation of Reservoir Rock Properties from Well Measurements
...Show More Authors

Porosity and permeability are the most difficult properties to determine in subsurface reservoir characterization. The difficulty of estimating them arising from the fact that porosity and permeability may vary significantly over the reservoir volume, and can only be sampled at well location. Secondly, the porosity values are commonly evaluated from the well log data, which are usually available from most wells in the reservoir, but permeability values, which are generally determined from core analysis, are not usually available. The aim of this study is: First, to develop correlations between the core and the well log data which can be used to estimate permeability in uncored wells, these correlations enable to estimate reservoir permeabil

... Show More
Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Variational Formulation with Deviating Arguments of Movable boundaries
...Show More Authors

In this paper, we study, in details the derivation of the variational formulation corresponding to functional with deviating arguments corresponding to movable boundaries. Natural or transversility conditions are also derived, as well as, the Eulers equation. Example has been taken to explain how to apply natural boundary conditions to find extremal of this functional.

View Publication Preview PDF
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
Optical Investigations of CdSe1-x Tex Thin Films
...Show More Authors

The alloys of CdSe1-xTex compound have been prepared from their elements successfully with high purity (99.9999%) which mixed stoichiometry ratio (x=0.0, 0.25, 0.5, 0.75 and 1.0) of (Cd, Se and Te) elements. Films of CdSe1-xTex alloys for different values of composition with thickness(0.5?m) have been prepared by thermal evaporation method at cleaned glass substrates which heated at (473K) under very low pressure (4×10-5mbar) at rate of deposition (3A?/s), after that thin films have been heat treated under low pressure (10-2mbar) at (523K) for two hours. The optical studies revealed that the absorption coefficient (?) is fairly high. It is found that the electronic transitions in the fundamental absorption edge tend to be allowed direct tr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
مجلة نسق
Islamic Sharia’s position on the phenomenon of bullying
...Show More Authors

The study was enriched by examining (Islamic Sharia’s position on the phenomenon of bullying) becausee bullying is a recurring aggressive behavior that Is one of the types of violence directed by a person or group of prsons; With the intent of deliberately harming and offending anotherr person or group of persons, It has several verbal, physical, electronIc or other formsforms Bullies may follow a policy of Ientimidation or intimidation, as well as ridicule; In order to belittle the victim .The study aims to know the Islamic Sharia ruling on bullying as a modern term for a content that Is as old as man, and the study reached several results, Including: Islam’s affirmation of the prohibition of this phenomenon In word, deed and gesture,

... Show More
Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Engineering
Software Implementation of Binary BCH Decoder Using Microcontroller
...Show More Authors

In this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.

 

 

View Publication Preview PDF