This paper predicts the resilient modulus (Mr) for warm mix asphalt (WMA) mixtures prepared using aspha-min. Various predictor variables were analyzed, including asphalt cement types, asphalt contents, nominal maximum aggregate sizes (NMAS), filler content, test temperatures, and loading times. Univariate and multivariate analyses were conducted to examine the behavior of each predictor variable individually and collectively. Through univariate analysis, it was observed that Mr exhibited an inverse trend with asphalt cement grade, NMAS, test temperature, and load duration. Although Mr increased slightly with higher filler and asphalt content, the magnitude of this increase was minimal. Multivariate analysis revealed that the rate of change of Mr was highly dependent on NMAS and the thermo-rheological properties of the asphalt cement. Initially, a linear regression model was developed; however, it underestimated low Mr values and overestimated high Mr values. Moreover, the linear model resulted in negative Mr values, indicating an inadequate representation of the relationship between Mr and predictor variables. Consequently, a nonlinear transformed regression framework was employed to develop an equation that more accurately predicted the Mr values of WMA mixtures. The resulting predictive model exhibited a coefficient of determination (R2) of approximately 95 %. To validate the effectiveness of the proposed model, the remaining 30 % of the test data was utilized. The results demonstrated that the developed model effectively represented the observed data not used during the model-building process. This validation was supported by an R2 of 95.8 % between the predicted and measured Mr values of WMA mixtures.
Environmental Tax is deemed as one of the most important tools that can be used to eliminate the problem of oil –based environment pollution resulted out of oil products processes and this has been significantly approved by the experience in those leading countries in the field of protecting the environment against pollution whereas oil-producing countries which are rather awkward in maintaining the environment such as Iraq , suffer from notorious environmental effects pertaining to oil product processes.
The problem of the research is represented the increased and constant rise in the volume of the environmental pollutants resulted from the processes managed by the intern
... Show MoreThe paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers and his family and companions.
The study of the jurisprudential opinions of scholars, their choices, or their weightings, sheds light on the approach they followed in their choices, and reveals the originality of the scholar or his influence on those who preceded him from among the scholars.
And the commentators of the noble hadith of the Prophet have their important contributions in this aspect, as they undertake the task of explaining the noble hadith, the second source of legislation
Contemporary commentators have their share in the service of the honorable hadith, and the statement of their choices and preferences, and am
... Show MoreThe adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1, 2-diylidenebis (methan-1-yl-1-ylidene)) bis (2-methoxyphenol)] derived from condensation reaction of hydrazine hydrate and 4-hydroxy-3-methoxybenzaldehyde, from aqueous solutions has been investigated through columnar method.The ligand (H2L) adsorption found to be dependent on adsorbent dosage, initial concentration and contact time.All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.),at room temperature (25±2)°C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monol
... Show MoreBackground: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.
Type of the study: cross –sectional study.
Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of
... Show MoreThe main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreIn this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.
Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.