A new pavement technology has been developed in Highway engineering: asphalt pavement production is less susceptible to oxidation and the consequent damages. The warm mix asphalt (WMA) is produced at a temperature of about (10-40) oC lower than the hot asphalt paving. This is done using one of the methods of producing a WMA. Although WMA's performance is rather good, according to previous studies, as it is less susceptible to oxidation, it is possible to modify some of its properties using different materials, including polymers. Waste tires of vehicles are one of the types of polymers because of their flexible properties. The production of HMA, WMA, and WMA modified with proportions of (1, 1.5, and 2%) of rubber crumbs by the dry method are accomplished in this work. Marshall Test and volumetric properties determination are performed to evaluate its performance. The results showed that using 1% of rubber crumbs as a replacement for fine aggregate in the warm asphalt mixture produced the best properties of the WMA compared to the conventional WMA.
Background: Decalcification of surface enamel adjacent to fixed orthodontic appliances, in the form of white spot lesions, is a wide spread and familiar well-known side effect of orthodontic treatment. The present study was carried out to evaluate the effect of enamel protective agent (Clinpro white varnish) on shear and tensile bond strength of Dentaurum orthodontic stainless steel brackets by using 3M Unitek and Ormco as orthodontic adhesive agents. Materials and methods: Sixty-four extracted human upper first premolar teeth were selected and randomly divided into two groups with 32 teeth each, representing the shear and tensile bond strength testing groups. Then according to the type of bonding adhesive and the addition of Clinpro before
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreGrass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents
... Show MoreThe Islamic Bank of Al-Nahrain offers a formula for financing the purchase of real estate through a deferred sale contract, through Murabaha to the order to buy, and the payment of the price is in the form of instalments that include (the purchase price of the profit and the mutual agreement on the real estate). This research aims to show the reflection of real estate murabaha on the bank's investments, by measuring the effect of real estate murabaha on the profits achieved by the Islamic Bank of Al-Nahrain Bank. The growth of 'real estate murabaha' realized from the 'amounts granted by Bank X, in addition to analyzing the financial ratios of profitability indicators, including (return on deposits Y2) and for the years (2016 - 20
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe main objective of this study is to measure the Impact of global financial crisis on some indicators of the Saudi Arabia's economy using the Mendel-Fleming model, the importance of the study applied by focusing on the theme of general equilibrium in the face of fluctuations in the global economy. Study used a descriptive approach and the methodology of econometrics to construct the model. Study used Eviews Program for data analysis. The Data was collected from the Saudi Arabian Monetary Agency, for the period (1997-2014).Stationery of the variables was checked by Augmented Dickey-Fuller (ADF) and Phillips Perron (PP) unit roots tests. And also the co-integration
... Show MoreThe aim of the research is to know the level of time management application and its impact on the performance of the job, a survey search in the general company for communication and information technology and provide recommendations that help employees to optimize the use of time and improve performance, which is an important element in controlling the various functions of the company. In order to achieve the objectives of the research, the questionnaire was based on two main variables and distributed to a random sample of (44) employees in the company out of (308) employees, thus the proportion of the sample (14%). After collecting the samples from the sample, there are (6) incomplete forms that have been retri
... Show More