This paper presents a three-dimensional Dynamic analysis of a rockfill dam with different foundation depths by considering the dam connection with both the reservoir bed and water. ANSYS was used to develop the three-dimensional Finite Element (FE) model of the rockfill dam. The essential objective of this study is the discussion of the effects of different foundation depths on the Dynamic behaviour of an embanked dam. Four foundation depths were investigated. They are the dam without foundation (fixed base), and three different depths of the foundation. Taking into consideration the changing of upstream water level, the empty, minimum, and maximum water levels, the results of the three-dimensional FE modelling of the rockfill dam show that adding the water effect decreases the natural frequencies of the system, but not more than 45%. While, with the increase of the reservoir water level of the dam from minimum to maximum, the natural frequencies of the dam decreased, but not more than 13% in the case of maximum water level changes. The results show that the influence of changing the upstream water level affects the horizontal displacement of the dam more than the vertical displacement.
Purpose: To determine the impact of service encounter in stimulating voluntary customer behaviors.
- Approach / methodology: It was selected a sample of customers Bank Iraqi Trade (TBI) was (105) individual, using a questionnaire designed in the light of previous studies, was drafted scale and tested in the light of a group of statistical methods developed (reliability coefficient, reliability coefficient composite, convergence). Then test hypotheses through structural equation modeling.
- Results: The behaviors and characteristics of the service provider in effect urged bank customers to perform voluntary extra, as the service environment service encounter
The successive international changes in the economic, political, cultural and other fields resulted in many phenomena that occupied different levels of interest, and have been followed up, studied and analysed by specialists and researchers especially under the development of the media in the global communication.
Even though these phenomena had reflections in the communication domain like development and changes in the mechanism of behaviours between the international communities, they created in the meantime a phenomenon that caused an imbalance in the production, spread and the use of the informations that were supposed to be for fewer than 5 countries whereas it actually it is for more than 180 countries.
Nowadays, Wheeled Mobile Robots (WMRs) have found many applications as industry, transportation, inspection, and other fields. Therefore, the trajectory tracking control of the nonholonomic wheeled mobile robots have an important problem. This work focus on the application of model-based on Fractional Order PIaDb (FOPID) controller for trajectory tracking problem. The control algorithm based on the errors in postures of mobile robot which feed to FOPID controller to generate correction signals that transport to torque for each driven wheel, and by means of dynamics model of mobile robot these torques used to compute the linear and angular speed to reach the desired pose. In this work a dynamics model of
... Show MoreA simple and novel membraneless paper-based microfluidic fuel cell was presented in this study. The occurrence of laminar flow was employed to ensure no mixing of the fuel and oxidant fluids along the bath of reaction. The acidic wastewater was used as a fuel. It was an air-breathing cell, so air and tab water were used as oxidants. Both the fuel and tab water flowed continuously under gravity. Whatman filter paper was used for preparation of the fuel cell channel and two carbon fibre electrodes were used and firmed on the edges of the cell. The performance of the cell was examined over three consecutive days. The results indicated that the present cell has the potential to generate electric power, but an extensive study is required to harv
... Show MoreCanonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.
In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe
... Show MoreThe complexity and variety of language included in policy and academic documents make the automatic classification of research papers based on the United Nations Sustainable Development Goals (SDGs) somewhat difficult. Using both pre-trained and contextual word embeddings to increase semantic understanding, this study presents a complete deep learning pipeline combining Bidirectional Long Short-Term Memory (BiLSTM) and Convolutional Neural Network (CNN) architectures which aims primarily to improve the comprehensibility and accuracy of SDG text classification, thereby enabling more effective policy monitoring and research evaluation. Successful document representation via Global Vector (GloVe), Bidirectional Encoder Representations from Tra
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThe present work utilizes polyacrylic acid beads (PAA) to remove Alizarin yellow R (AYR)] and Alizarin Red S (ARS) from its solution. The isotherms of adsorption were investigated and the factors that impact them, such as temperature, ionic strength effect, shaking effect, and wet PAA. The isotherms of adsorption of (ARS) were found obeys the Freundlich equation. The isotherms of adsorption of (AYR) were found obeys the Langmuir equation. At various temperatures, the adsorption process on (PAA) was investigated. According to our data, there is a positive correlation between the (ARS and AYR) adsorption on the PAA and temperature (Endothermic process). The computation of the thermodynamic functions (ΔH, ΔG, and ΔS) is based on the foregoi
... Show MoreAs a result of the significance of image compression in reducing the volume of data, the requirement for this compression permanently necessary; therefore, will be transferred more quickly using the communication channels and kept in less space in memory. In this study, an efficient compression system is suggested; it depends on using transform coding (Discrete Cosine Transform or bi-orthogonal (tap-9/7) wavelet transform) and LZW compression technique. The suggested scheme was applied to color and gray models then the transform coding is applied to decompose each color and gray sub-band individually. The quantization process is performed followed by LZW coding to compress the images. The suggested system was applied on a set of seven stand
... Show More