Preferred Language
Articles
/
GIZlsoYBIXToZYAL87GI
Prediction of bearing capacity of driven piles for Basrah governatore using SPT and MATLAB
...Show More Authors

Based on the results of standard penetration tests (SPTs) conducted in Al-Basrah governorate, this research aims to present thematic maps and equations for estimating the bearing capacity of driven piles having several lengths. The work includes drilling 135 boreholes to a depth of 10 m below the existing ground level and three standard penetration tests (SPT) at depths of 1.5, 6, and 9.5 m were conducted in each borehole. MATLAB software and corrected SPT values were used to determine the bearing capacity of driven piles in Al-Basrah. Several-order interpolation polynomials are suggested to estimate the bearing capacity of driven piles, but the first-order polynomial is considered the most straightforward. Furthermore, the root means squared error (RMSE) for all suggested polynomials are roughly the same. The production of thematic maps demonstrates the variation in bearing capacity of driven piles over the entire territory of Al-Basrah governorate in correlation with different depths. The results of the statistical equations showed that there is good agreement with those obtained from the SPT data. When compared with the observed values from SPT, the allowable bearing capacity results for the driven piles ranged from (−3 to +38)%. The main results of this study showed a variation of 30% between calculated and estimated values of bearing capacity of driven piles for all lengths of piles at a 95% confidence interval.

Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Unifying The Evaluation Criteria Of Many Objectives Optimization Using Fuzzy Delphi Method
...Show More Authors

Many objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector.  Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Mar 31 2020
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Extended Finite Element Analysis of Reinforced Concrete Beams Using Meso-Scale Modeling
...Show More Authors

Four simply supported reinforced concrete (RC) beams were test experimentaly and analyzed using the extended finite element method (XFEM). This method is used to treat the discontinuities resulting from the fracture process and crack propagation in that occur in concrete. The Meso-Scale Approach (MSA) used to model concrete as a heterogenous material consists of a three-phasic material (coarse aggregate, mortar, and air voids in the cement paste). The coarse aggregate that was used in the casting of these beams rounded and crashed aggregate shape with maximum size of 20 mm. The compressive strength used in these beams is equal to 17 MPa and 34 MPa, respectively. These RC beams are designed to fail due to flexure when subjected to lo

... Show More
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Mar 16 2022
Journal Name
2022 Muthanna International Conference On Engineering Science And Technology (micest)
Virtual Performance Evaluation of Net-Zero Energy Building (NZEB) Using BIM Analysis
...Show More Authors

View Publication
Scopus (4)
Crossref (8)
Scopus Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of Mandibular Third Molar Position by Using Space-Width Ratio Method
...Show More Authors

Background: The prediction of changes in the mandibular third molar position and eruption is an important clinical concern because third molar retention may be beneficial for orthodontic anchorage. The aims of this study were to assess the mandibular third molar position by using medical CT scan and lateral reconstructed radiograph and evaluate gender differences. Materials and Methods: The sample of present study consisted of 39 patients (18 males and 21 females) with age range 11-15 years who were attending at Al-Suwayra General Hospital/ the Computerized Tomography department. The distance from anterior edge of ramus to distal surface of permanent mandibular second molar and mesio-distal width of developing mandibular third molar were

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Producing High Purity of Metal Oxide Nano Structural Using Simple Chemical Method
...Show More Authors

View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Nov 14 2019
Journal Name
Journal Of Physics: Conference Series
Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method
...Show More Authors

Journal of Physics: Conference Series PAPER • THE FOLLOWING ARTICLE ISOPEN ACCESS Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method Luma Naji Mohammed Tawfiq1, Nadia H Al-Noor2 and Taghreed H Al-Noor1 Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series, Volume 1294, Issue 3 Citation Luma Naji Mohammed Tawfiq et al 2019 J. Phys.: Conf. Ser. 1294 032020 DOI 10.1088/1742-6596/1294/3/032020 DownloadArticle PDF References Download PDF 135 Total downloads 88 total citations on Dimensions. Turn on MathJax Share this article Share this content via email Share on Facebook (opens new window) Share on Twitter (opens new window) Share on Mendeley (opens new window) Hide article and author

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (10)
Scopus Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
Study of Gamma — irradiation effects on the Polymethylmethacrylate (PMMA) Using (PAL) Method
...Show More Authors

Gamma - irradiation effect on polymethylmethacrylate (PMMA) samples has been studied using Positron Annihilation Lifetime (PAL) method. The orthopositronium (o-Ps) lifetime τ3, hence the o-ps parameters, the volume hole size (Vh) and the free volume fraction (Ꞙh) in the irradiated samples were measured as a function of gamma-irradiation dose up to 28.05 kGy. It has been shown that τ 3, Vh, and Ꞙh, are increasing in general with increasing gamma-dose, to reach a maximum percentage increment of 22.42% in τ3, 60% in Vh and 29.5% in Ꞙh, at. 2.55 kGy, whereas τ2 reaches maximum increment of 119. 7% at 7.65 kGy. The results s

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Case Studies In Thermal Engineering
Robust composite temperature control of electrical tube furnaces by using disturbance observer
...Show More Authors

As one type of resistance furnace, the electrical tube furnace (ETF) typically experiences input noise, measurement noise, system uncertainties, unmodeled dynamics and external disturbances, which significantly degrade its temperature control performance. To provide precise, and robust temperature tracking performance for the ETF, a robust composite control (RCC) method is proposed in this paper. The overall RCC method consists of four elements: First, the mathematical model of the ETF system is deduced, then a state feedback control (SFC) is constructed. Third, a novel disturbance observer (DO) is designed to estimate the lumped disturbance with one observer parameter. Moreover, the stability of the closed loop system including controller

... Show More
View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Numerical Solution of Fractional Volterra-Fredholm Integro-Differential Equation Using Lagrange Polynomials
...Show More Authors

In this study, a new technique is considered for solving linear fractional Volterra-Fredholm integro-differential equations (LFVFIDE's) with fractional derivative qualified in the Caputo sense. The method is established in three types of Lagrange polynomials (LP’s), Original Lagrange polynomial (OLP), Barycentric Lagrange polynomial (BLP), and Modified Lagrange polynomial (MLP). General Algorithm is suggested and examples are included to get the best effectiveness, and implementation of these types. Also, as special case fractional differential equation is taken to evaluate the validity of the proposed method. Finally, a comparison between the proposed method and other methods are taken to present the effectiveness of the proposal meth

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref