Here, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity
Roller compacted concrete (RCC) is a concrete compacted by roller compaction. The concrete mixture in its unhardened state must support a roller while being compacted. The aim of this research work was to investigate the behavior and properties of roller compacted concrete when constructed in the laboratory using roller compactor manufactured in local market to simulate the field conditions. The roller compaction was conducts in three stages; each stage has different loading and number of passes of the roller. For the first stage, a load of (24) kg and (5) passes in each direction had been employed. For the second stage, a load of (104) kg and (10) passes in each direction were conducted. Finally, at the third stage, a load of (183) kg a
... Show MoreThe proliferation of electronic games, video games and computers has caused children and teenagers to become attracted to these games and become their favorite entertainment. The widespread of these games has generated widespread debate about positive aspects and negative aspects. It is evident that there are two main trends in the impact of electronic games on the behavior of children and adolescents. The first trend is that e-games have positive effects on children and adolescents, especially in cognitive abilities and skills in learning. While the second view sees that electronic games have negative effects that appear in social isolation and lack of movement and aggression. Through the review of previous literature, the current resea
... Show MoreThe study aims to identify the neurological perfectionism of talented girls with disabilities and do a case study for one of these girls. The sample of the study consisted of (11) female students at the university level, 5 females with disability and (6) normal female-students. The sample also included (19) secondary school female students in Tabuk region, including 10 students with visual disability and (9) normal students. The case study was limited to one case of mentally superior girls (talented) with kinetic disability. The researcher adopted the descriptive methodology (case study), he used neurological perfectionism scale, Salah Mekhemar interview, Stanford interfacial intelligence scale fifth picture, case study form. The re
... Show MoreTo maintain river flows necessary to meet social and ecological objectives, instream environmental flows are frequently used as a strategy. The capability of three alternative historical flow approaches to protect against low flows is shown in this study using gage stations in the Shatt Al-Hillah River in Iraq. The extension of the Shatt al-Hillah River is the focus of this research discussion on environmental flow assessment. The available data on discharge in this research were adopted for ten years from 2012-2021. Different flow methods were adopted to establish a minimum environmental flow in the Shatt Al-Hillah River. Three hydrological-based approaches: Tennant, modified Tennant, and low-flow metrics like 7Q10, wer
... Show MoreFlexible pavement design and analysis were carried out in the past with semi-experimental methods, using elastic characteristics of pavement layers. Due to the complex interferences between various layers and their time consumption, the traditional pavement analysis, and design methods were replaced with fast and powerful methods including the Finite Element Method (FEM) and the Discrete Element Method (DEM). FEM requires less computational power and is more appropriate for continuous environments. In this study, flexible pavement consisting of 5 layers (surface, binder, base, subbase, and subgrade) had been analyzed using FEM. The ABAQUS (6.14-2) software had been utilized to investigate the influence of the base layer depth on ver
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show More