Modified asphalt is considered one of the alternatives to address the problems of deficiencies in traditional asphalt concrete, as modified asphalt addresses many of the issues that appear on the pavement layers in asphalt concrete, resulting from heavy traffic and vehicles loaded with loads that exceed the design loads and the large fluctuations in the daily and seasonal temperatures of asphalt concrete. The current study examined the role of polyphosphoric acid (PPA) as a modified material for virgin asphalt when it was added in different proportions (1%, 2%, 3%, 4%) of the asphalt weight. The experimental program includes the volumetric characteristics associated with the Marshall test, the physical properties, and the FTIR spectroscopy examination of virgin asphalt and polyphosphoric acid (PPA) modified asphalt. This study showed that mixtures with modified asphalt using polyphosphoric acid (PPA) by 3% achieved the typical Marshall properties at the optimal asphalt content of 4.8%, recording a 10% decrease in the optimum asphalt content for the mixtures made with virgin (unmodified) asphalt, whose proportion was 4.9% is the optimum asphalt content. PPA is available in the local markets and is considered cheaper than polymers. It is also regarded as economical as it reduces the optimum content of asphalt.
The effective surface area of drug particle is increased by a reduction in the particle size. Since dissolution takes place at the surface of the solute, the larger the surface area, the further rapid is the rate of drug dissolution. Ketoprofen is class II type drug according to (Biopharmaceutics Classification System BCS) with low solubility and high permeability. The aim of this investigation was to increase the solubility and hence the dissolution rate by the preparation of ketoprofen nanosuspension using solvent evaporation method. Materials like PVP K30, poloxamer 188, HPMC E5, HPMC E15, HPMC E50, Tween 80 were used as stabilizers in perpetration of differ
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators