Preferred Language
Articles
/
tIZvWIYBIXToZYALZYiv
Size Effect of Hydrated Lime on the Mechanical Performance of Asphalt Concrete
...Show More Authors

Despite widespread agreement on the beneficial nature of hydrated lime (HL) addition to asphalt concrete mixes, understanding of the effect of HL particle size is still limited. Previous investigations have focused mainly on two different size comparisons, and so certain guidance for a practical application cannot yet be produced. This study investigates three distinct sizes of HL, in the range of regular, nano, and sub-nano scales, for their effects on the properties of modified asphalt concretes. Five different percentages of HL as a partial replacement of ordinary limestone filler in asphalt concrete mixes were studied for wearing course application purposes. Experimental tests were conducted to evaluate the mechanical properties, including resistance to plastic flow, volumetric properties, moisture susceptibility, resilient modulus, and permanent deformation. The results revealed that a positive correlation exists between the mechanical properties and the fineness of HL particle sizes.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
International business particularly that centered on foreign direct investment
...Show More Authors

:  

While practicing of International business particularly that centered on foreign direct investment, let on one side, to achieving objectives of transnational corporations specially that represented in continuous pursue to improving its cash flows and maximization of stockholders wealth which is considered the most important objective to the transnational corporations, but in the same time its lead, on other side, to increasing the foreign exchange risk exposuring these corporations. So, the transnational corporations (TNCs) struggling to make strategies which are dealing in smart way, with this risk and its management in way that enable to avoiding risk comple

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Stress and Its Impact on Mental and Physical Health
...Show More Authors

Stress is an inevitable part of life. Stress occurs when stressful events of self, environmental, or social origin affect the individual's resilience and threaten to collapse his psychological and physical systems. The stress represents difficulties and obstacles that may exceed the individual's ability to bear them and deal with them, which causes him stress and causes negative effects on his psychological and physical health. Therefore, the current research aimed to identify the negative effects of psychological stress on the psychological and physical health of the individual through the literature that dealt with this topic. It was among the results of the research that one of the negative effects of stresses on mental health is the

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Moving Objects Detection Based on Frequency Domain: image processing
...Show More Authors

In this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Impulsive Pressure Activity on MHD Flux Generalized Burgers Fluid
...Show More Authors
Abstract<p>The main purpose of the work is to analyse studies of themagnetohydrodynamic “MHD” flow for a fluid of generalized Burgers’ “GB” within an annular pipe submitted under impulsive pressure “IP” gradient. Closed form expressions for the velocity profile, impulsive pressure gradient have been taken by performing the finite Hankel transform “FHT” and Laplace transform “LT” of the successive fraction derivatives. As a result, many figures are planned to exhibit the effects of (different fractional parameters “DFP”, relaxation and retardation times, material parameter for the Burger’s fluid) on the profile of velocity of flows. Furthermore, these figures are compa</p> ... Show More
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref