Preferred Language
Articles
/
joe-2033
Development of Pavement Maintenance Management System for Baghdad Urban Roadway Network
...Show More Authors

The road transportation system is considered as major component of the infrastructure in any country, it affects the developments in economy and social activities. The Asphalt Concrete which is considered as the major pavement material for the road transportation system in Baghdad is subjected to continuous deterioration with time due to traffic loading and environmental conditions, it was felt that implementing a comprehensive pavement maintenance management system (PMMS), which should be capable for preserving the functional and structural conditions of pavement layers, is essential. This work presents the development of PMMS with Visual inspection technique for evaluating the Asphalt Concrete pavement surface condition; common types of Asphalt Concrete distress including (bleeding of Asphalt, patching, block cracking, edge cracking, longitudinal and transverse cracking, rutting, pot holes, longitudinal and transverse deformation) with their various severity and intensity conditions have been included in the system as data base. The surface of the pavement was divided into sections, and the pavement condition is visually evaluated by the raters using specially designed forms, each type of defect was measured, classified, and rated according to type, severity, and extent. Data will be fed to the system using the computer, various types of intensity and severity of distress were analyzed by the system, the present condition rating (PCR) of the pavement section is determined, and the system suggests the required maintenance action. The developed system which is assigned (PMMS-09) was verified in evaluating the pavement surface condition at AL-Jaderiah campus roadway network. The results indicated that the system is sound in evaluation of the pavement condition and in suggestion of the proper maintenance to reserve the pavement condition.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
Comparative Study between Activated Carbon and Charcoal for the Development of Latent Fingerprints on Nonporous Surfaces
...Show More Authors

 

For criminal investigations, fingerprints remain the most reliable form of personal identification despite developments in other fields like DNA profiling. The objective of this work is to compare the performance of both commercial charcoal and activated carbon powder derived from the Alhagi plant to reveal latent fingerprints from different non-porous surfaces (cardboard, plain glass, aluminum foil sheet, China Dish, Plastic, and Switch). The effect of three variables on activated carbon production was investigated. These variables were the impregnation ratio (the weight ratio of KOH: dried raw material), the activation temperature, and the activation time. The effect factors were investigated using Central Composite Design

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journa
Comparative Study between Activated Carbon and Charcoal for the Development of Latent Fingerprints on Nonporous Surfaces
...Show More Authors

For criminal investigations, fingerprints remain the most reliable form of personal identification despite developments in other fields like DNA profiling. The objective of this work is to compare the performance of both commercial charcoal and activated carbon powder derived from the Alhagi plant to reveal latent fingerprints from different non-porous surfaces (cardboard, plain glass, aluminum foil sheet, China Dish, Plastic, and Switch). The effect of three variables on activated carbon production was investigated. These variables were the impregnation ratio (the weight ratio of KOH: dried raw material), the activation temperature, and the activation time. The effect factors were investigated using Central Composite Design (CCD) softwa

... Show More
Crossref (3)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives
An analysis for adoption of subsurface irrigation technology and its role in agricultural development in Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon May 27 2024
Journal Name
Eureka: Physics And Engineering
Systematic development of an autonomous robotic car for fire-fighting based on the interactive design approach
...Show More Authors

Fire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
2008 Ieee International Joint Conference On Neural Networks (ieee World Congress On Computational Intelligence)
Linear block code decoder using neural network
...Show More Authors

View Publication
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
FILTRATION MODELING USING ARTIFICIAL NEURAL NETWORK (ANN)
...Show More Authors

In this research Artificial Neural Network (ANN) technique was applied to study the filtration process in water treatment. Eight models have been developed and tested using data from a pilot filtration plant, working under different process design criteria; influent turbidity, bed depth, grain size, filtration rate and running time (length of the filtration run), recording effluent turbidity and head losses. The ANN models were constructed for the prediction of different performance criteria in the filtration process: effluent turbidity, head losses and running time. The results indicate that it is quite possible to use artificial neural networks in predicting effluent turbidity, head losses and running time in the filtration process, wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Vehicular Ad-hoc Network (VANET) – A Review
...Show More Authors

This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref