The present study devoted to determine the ultimate lateral carrying capacity of piles foundation in contaminated clayey soils and subjected to lateral cyclical loading. Two methods have been used to calculate the lateral carrying capacity of piles foundation; the first one is two-line slopes intersection method (TLSI) and the second method is a modified model of soil degradation. The model proposed by Heerama and then developed by Smith has been modified to take into consideration the effects of heavy loads and soil contamination. The ultimate lateral carrying capacity of single pile and piles group (2×2) driven into samples of contaminated clayey soils have been calculated by using the two methods. Clayey soil samples are contaminated with four percentages of industrial wastewater (10, 20, 40 and 100) % of the distilled water used in the soaking process, the soaking procedure of soil samples have been proceeded for 30 days. Also, two ratios of eccentricity to embedded length (e/L = 0.25 and 0.5) have been examined. The results obtained from two analytical methods are well agreed with those obtained experimentally. The ultimate lateral carrying capacity, Pu (analytical) /Pu (experimentally) ranged from (75-8) % and (77-80) % of single pile with e/L = 0.25 and 0.5 respectively. In the piles group the ratio ranged (67-80) % and (71-79) % for e/L = 0.25 and 0.5 respectively.
The survey and checklist of invasive species of the insects in some different localities of Iraq are revised; 24 invasive species were documented until December 2018 during the current investigations. The species distributions, common names and synonyms are given.
The current investigation included all of exotic species in Iraq, which are not collected during this study.
The rubber ropes exercises affected muscle groups, which in turn affects the corners of the conditions of the body before and over the barrier where affected the time passed. To change the angle of the approaching and payment impact on passing each times the barrier 1-5. That passed over the barrier 1and gate 5 impacts on the nature of the achievement, where time has become less. Find the values of cruise missiles and other phases and stages of pitch angle other categories which it enshrines stood as compelling rejection men's 110m hurdles. Find the value of the instant messaging distances between different barriers and stages. Studies by adding rubber sling barriers race categories, measurement of kinematic variables. Emphasis on the devel
... Show MoreBackground: Periodontitis (PD) is well-known chronic disease affecting the periodontal ligament and alveolar bone, Osteoarthritis (OA) is a chronic joint disease with compound reasons characterized by synovial inflammation, subchondral bone remodeling, also the formation of osteophytes, that cause cartilage degradation. Chronic periodontitis and osteoarthritis are considered widely prevalent diseases and related to tissue destruction due to chronic inflammation in general health and oral health. The aim of this study is todetermine the association of chronic periodontitis and osteoarthritits in patients by analysing tumor necrosis factor alpha TNFα and high sensitive c-reactive protein (hsCRP) in the serum. Materials and Method: A tot
... Show MoreThe aim of this study is to investigate the kinetics of copper removal from aqueous solutions using an electromembrane extraction (EME) system. To achieve this, a unique electrochemical cell design was adopted comprising two glass chambers, a supported liquid membrane (SLM), a graphite anode, and a stainless-steel cathode. The SLM consisted of a polypropylene flat membrane infused with 1-octanol as a solvent and bis(2-ethylhexyl) phosphate (DEHP) as a carrier. The impact of various factors on the kinetics constant rate was outlined, including the applied voltage, initial pH of the donor phase solution, and initial copper concentration. The results demonstrated a significant influence of the applied voltage on enhancing the rate of c
... Show MoreIn this paper, we will prove the following theorem, Let R be a ring with 1 having
a reverse derivation d ≠ 0 such that, for each x R, either d(x) = 0 or d(x) is
invertible in R, then R must be one of the following: (i) a division ring D, (ii) D 2 ,
the ring of 2×2 matrices over D, (iii) D[x]/(x ) 2
where char D = 2, d (D) = 0 and
d(x) = 1 + ax for some a in the center Z of D. Furthermore, if 2R ≠ 0 then R = D 2 is
possible if and only if D does not contain all quadratic extensions of Z, the center of
D.
this paper, we will prove the following theorem, Let R be a ring with 1 having
a reverse derivation d ≠ 0 such that, for each x R, either d(x) = 0 or d(x) is
invertible in R, then R must be one of the following: (i) a division ring D, (ii) D 2 ,
the ring of 2×2 matrices over D, (iii) D[x]/(x ) 2
where char D = 2, d (D) = 0 and
d(x) = 1 + ax for some a in the center Z of D. Furthermore, if 2R ≠ 0 then R = D 2 is
possible if and only if D does not contain all quadratic extensions of Z, the center of
D.
The purpose of this paper is applying the robustness in Linear programming(LP) to get rid of uncertainty problem in constraint parameters, and find the robust optimal solution, to maximize the profits of the general productive company of vegetable oils for the year 2019, through the modify on a mathematical model of linear programming when some parameters of the model have uncertain values, and being processed it using robust counterpart of linear programming to get robust results from the random changes that happen in uncertain values of the problem, assuming these values belong to the uncertainty set and selecting the values that cause the worst results and to depend buil
... Show MorePlayfair cipher is a substitution scheme. The classical playfair scheme has a limited matrix size containing only uppercase letters, so it is prone to hackers and cryptanalysis. To increase the resistance of playfair cipher, a new encipherment and decipherment method is proposed in this work, which depends on the permutation and its inverse, respectively. In addition, a modified key matrix is utilized, which includes capital and small Alphabets, numbers, and 38 special characters collected from ASCII codes. In the proposed method, both substitution and transposition schemes are used, where the first stratum of the cipher is a substitution by using key matrix and the second stratum is a transposi
... Show More