Despite widespread agreement on the beneficial nature of hydrated lime (HL) addition to asphalt concrete mixes, understanding of the effect of HL particle size is still limited. Previous investigations have focused mainly on two different size comparisons, and so certain guidance for a practical application cannot yet be produced. This study investigates three distinct sizes of HL, in the range of regular, nano, and sub-nano scales, for their effects on the properties of modified asphalt concretes. Five different percentages of HL as a partial replacement of ordinary limestone filler in asphalt concrete mixes were studied for wearing course application purposes. Experimental tests were conducted to evaluate the mechanical properties, including resistance to plastic flow, volumetric properties, moisture susceptibility, resilient modulus, and permanent deformation. The results revealed that a positive correlation exists between the mechanical properties and the fineness of HL particle sizes.
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreA Multiple System Biometric System Based on ECG Data
The problem of noise in the Baghdad airport has been examined in this study; and noise measurement and survey studies have been carried out at four high noise level (operation, training and development, quality system, and information and technology) zones located in this region. Noise exposure is a common hazard to workforce in general although at varying degrees depending on the occupation, as many workers are exposed for long periods of time to potentially hazardous noise. A questionnaire was completed by 122 workers during this study in order to determine the physical, physiological, and psycho-social impacts of the noise on workers and to specify what kind of measurements have been taken both by the employers and workers for protection
... Show MoreThe problem of noise in the Baghdad airport has been examined in this study; and noise measurement and survey studies have been carried out at four high noise level (operation, training and development, quality system, and information and technology) zones located in this region. Noise exposure is a common hazard to workforce in general although at varying degrees depending on the occupation, as many workers are exposed for long periods of time to potentially hazardous noise. A questionnaire was completed by 122 workers during this study in order to determine the physical, physiological, and psycho-social impacts of the noise on workers and to specify what kind of measurements have been taken both by the employers and workers for protection
... Show MoreThe research aims to release the concept of auditing reporting and its role in the rationalization of economic decisions in the companies listed in the Iraq Stock Exchange from the viewpoint of academics, professionals, investors and lenders. Auditor reporting witnessed the great progress in many areas addressed many of the previous studies compare with Iraqi auditors reporting because there are some defects in these aria .The research problem focused whether the auditor report in Iraq is contains useful information to rationalize investment decisions & lending decisions in the shareholding companies listed on the Iraq Stock Exchange , and under that premise , " There is statistically significant relationship between the reporting au
... Show MorePassword authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The study aims at showing the role of tax audit in Impact the quality of tax statements. Tax audit is one of the most important means used by tax management to identify taxable revenues in a just, fair manner. The quality of statements relies on the extent to which the information provided by taxpayers is true and accurate. Tax audit works is compatible with the strategy of increasing tax adherence and detecting non-adherence cases and penalizing those who commit such violations. The study reached a number of results and conclusions. One of the most important results is that tax audit helps improve the information content of the taxpayers tax statements. This leads to recalculating taxable incomes and re-fixing t
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show More