Under-reamed piles defined by having one or more bulbs have the potential for sizeable major sides over conventional straight-sided piles, most of the studies on under-reamed piles have been conducted on the experimental side, while theoretical studies, such as the finite element method, have been mainly confined to conventional straight-sided piles. On the other hand, although several laboratory and experimental studies have been conducted to study the behavior of under-reamed piles, few numerical studies have been carried out to simulate the piles' performance. In addition, there is no research to compare and evaluate the behavior of these piles under dynamic loading. Therefore, this study aimed to numerically investigate bearing capacity and settlement of under-reamed piles compared with uniform pile sections by sinusoidal excitation machines foundation. Different geometrical under-reamed piles single and double bulbs compared with uniform pile using finite element method, PLAXIS 3D software. The result showed that uniform pile fizzles out to support the total load and the final settlement was 4.97 cm. Single under-reamed pile S.U.P and double under-reamed pile D.U.P can be reduced final settlement 76% and 81 % respectively.
The motion of fast deuterons in most dense plasma focus devices ( DPF ) , may be characterized that it has a complex nature in its paths and this phenomena by describing a through gyrating motion with arbitrary changes in magnitude and direction . In this research , we focused on the understanding the theoretical concepts which depend deeply on the experimental results to explain the deuteron motions in the pinch region , and then to use the fundamental physical formulas that are deeply related to the explanation of this motion to prepare a suitable model for calculating the vertical and radial components for deuteron velocity by improving the Rung – Kutta Method
Background: Pervasive Developmental Disorder (PDD) is a term refers to the overarching group of conditions to which autism spectrum disorder (ASD) belongs .
Objective: This study was designed to determine the existing behavior of children with autism in dental sitting, the behavior improvements in recall dental visits and evaluate the improvement in oral hygiene with using specific visual pedagogy chart.
Type of the study: Cross-sectional study.
Methods: Forty children of both genders, ages ranged from 4 – 6 years having primary teeth only were selected whose medical history included a diagnosis
... Show MoreThe current study aims to find out:
- The ingratiating behavior of university students.
- The differences of statistical significance in The ingratiating behavior among university students according to the variables of sex and specialization
The current study is determined by University of Baghdad students of both genders (males and females) and for both majors (scientific and humanities) for the academic year (2019-2020).
In order to achieve the researcher's objectives:Ingratiating behavior scale has been constructed. It consists in its final form of (32) items divided into four behaviors. The researcher has extracted scale validity and reliability.
The researcher based the two scales
... Show MoreExpansive soil is one of the most serious problems that face engineers during the execution of any infrastructure projects. Soil stabilization using chemical admixture is one of the most traditional and widespread methods of soil improvement. Nevertheless, soil improvement on site is one of the most economical solutions for many engineering applications. Using construction and demolishing waste in soil stabilization is still under research., The aim of this study is to identify the effect of using concrete demolishing waste (CDW) in soil stabilization. Serious tests were conducted to investigate the changes in the geotechnical properties of the natural soil stabilized with CDW. From the results, it is concluded that the
... Show MoreCantilever beams are used in many crucial applications in machinery and construction. For example, the airplane wing, the microscopic probe for atomic force measurement, the tower crane overhang and twin overhang folding bridge are typical examples of cantilever beams. The current research aims to develop an analytical solution for the free vibration problem of cantilever beams. The dynamic response of AISI 304 beam represented by the natural frequencies was determined under different working surrounding temperatures ((-100 ℃ to 400 ℃)). A Matlab code was developed to achieve the analytical solution results, considering the effect of some beam geometrical dimensions. The developed analytical solution has been verified successful
... Show MoreCantilever beams are used in many crucial applications in machinery and construction. For example, the airplane wing, the microscopic probe for atomic force measurement, the tower crane overhang and twin overhang folding bridge are typical examples of cantilever beams. The current research aims to develop an analytical solution for the free vibration problem of cantilever beams. The dynamic response of AISI 304 beam represented by the natural frequencies was determined under different working surrounding temperatures ((-100 ℃ to 400 ℃)). A Matlab code was developed to achieve the analytical solution results, considering the effect of some beam geometrical dimensions. The developed analytical solution has been verified successfully wi
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More