In this paper , concrete micro-piles were used to improve the bearing capacity of the soil which is supporting the shallow foundation by using groups of (4; 6 and 9)bored short micro-piles which have, (D=0.125m and D=0.1m), and length to diameter ratio (L/D) equal to (6; 10 and 12) respectively. To calculate the bearing capacity of the micro-piles,(Tomlinson) and (Lamda) methods were used; also the soil properties were taken from Al-Muthana airport,(Al-Qyssi,2001) [1]. The results show that; increasing the number of piles and/ or the diameters and lengths; and the interaction between the bearing capacity of the shallow foundation with the bearing capacity of the pile group which leads to increasing the strength against the external loads
... Show MoreAdvancements and modernizations introduced into the educational and pedagogical systems have significantly impacted teaching processes and how subjects are presented and explained to students. The focus has shifted to how learners interact with the material they need to learn, providing sufficient opportunities for learning and granting them freedom and self-confidence to achieve learning objectives. The research problem stems from the researcher's experience as a lecturer in the College of Physical Education and Sports Science, particularly in teaching basketball. She observed that some instructors were deficient in using the most effective teaching methods. The researcher formulated her research question based on these observations: "What
... Show MoreCredit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show MoreIn this study, the melting-cooling method was used to prepare the chalcogenide compound S60-Se40-X-PbX. Four samples were obtained by partial replacement of Selenium with Lead in the weight ratios x = 0, 10, 20, and 30, respectively. The materials were mixed separately, ground, placed in quartz ampoules, and heated to 500 degrees Celsius. After conducting several operations on the samples, their insulating properties were studied, represented by the real dielectric constant and the imaginary dielectric constant, and the electrical conductivity was measured as a function of the frequency. It was found that partial replacement plays an impo
Drilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.
Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.
This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.
The experim
... Show MoreIn this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains
This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
Attack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting from the balance between O's and I' in the key to reduce the probability of key space.
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More