Preferred Language
Articles
/
GIZlsoYBIXToZYAL87GI
Prediction of bearing capacity of driven piles for Basrah governatore using SPT and MATLAB
...Show More Authors

Based on the results of standard penetration tests (SPTs) conducted in Al-Basrah governorate, this research aims to present thematic maps and equations for estimating the bearing capacity of driven piles having several lengths. The work includes drilling 135 boreholes to a depth of 10 m below the existing ground level and three standard penetration tests (SPT) at depths of 1.5, 6, and 9.5 m were conducted in each borehole. MATLAB software and corrected SPT values were used to determine the bearing capacity of driven piles in Al-Basrah. Several-order interpolation polynomials are suggested to estimate the bearing capacity of driven piles, but the first-order polynomial is considered the most straightforward. Furthermore, the root means squared error (RMSE) for all suggested polynomials are roughly the same. The production of thematic maps demonstrates the variation in bearing capacity of driven piles over the entire territory of Al-Basrah governorate in correlation with different depths. The results of the statistical equations showed that there is good agreement with those obtained from the SPT data. When compared with the observed values from SPT, the allowable bearing capacity results for the driven piles ranged from (−3 to +38)%. The main results of this study showed a variation of 30% between calculated and estimated values of bearing capacity of driven piles for all lengths of piles at a 95% confidence interval.

Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Sust Journal Of Engineering And Computer Science (jecs)
Virtual failure influence of Roseires dam on Khartoum city using HEC-RAS Hydraulic simulation modeling
...Show More Authors

Dam break is series phenomenon that can result in fatal consequences and loss of properties. Unfortunately, the observed consequences can only be available after the dam breaks. Therefore, it is important to anticipate what will happen prior to dam break to issue suitable warning and locate the possible risk areas. This study attempts to simulate the case of dam break in Blue Nile at Roseires dam and see its consequences downstream. Roseires dam lies at a distance of 630 km south of Khartoum, Sennar dam lies at about 260 km downstream of Roseires dam. In this study hydraulic model is developed based of Hydraulic Engineering Centre (HEC), River Analysis System (RAS), and HEC- RAS. The HEC-RAS based model is calibrated and validated usi

... Show More
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Lead Ions from Wastewater by using a Local Adsorbent from Charring Tea Wastes
...Show More Authors

   Adsorption of lead ions from wastewater by native agricultural waste, precisely tea waste. After the activation and carbonization of tea waste, there was a substantial improvement in surface area and other physical characteristics which include density, bulk density, and porosity. FTIR analysis indicates that the functional groups in tea waste adsorbent are aromatic and carboxylic. It can be concluded that the tea waste could be a good sorbent for the removal of Lead ions from wastewater. Different dosages of the adsorbents were used in the batch studies. A random series of experiments indicated a removal degree efficiency of lead reaching (95 %) at 5 ppm optimum concentration, with adsorbents R2 =97.75% for tea. Three mo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Environmental Earth Sciences
Urban geochemistry assessment using pollution indices: a case study of urban soil in Kirkuk, Iraq
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Anticorrosion Behavior of Deposited Magnetite on Galvanized Steel in Saline Water Using RF-Magnetron Sputtering
...Show More Authors

Thin films of Magnetite have been deposited on Galvanized Steel (G-S) alloy using RF-reactive magnetron sputtering technique and protection efficiency of the corrosion of G-S. A Three-Electrodes Cell was used in saline water (3.5 % NaCl) solution at different temperatures (298, 308, 318 & 328K) using potentiostatic techniques with. Electrochemical Impedance Spectroscopy (EIS) and fitting impedance data via Frequency Response Analysis (FRA) were applied to G-S alloy with Fe3O4 and tested in 3.5 % NaCl solution at 298K.Results taken from Nyquist and Bode plots were analyzed using software provided with the instrument. The results obtained show that the rate of corrosion of G.S alloy increased with increasing the temperatures from 298 t

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the Performance of IT Governance According to COBIT5 Framework by Using the Balanced Scorecard
...Show More Authors

The research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.

The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
A Solution of Second Kind Volterra Integral Equations Using Third Order Non-Polynomial Spline Function
...Show More Authors

In this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Nov 07 2024
Journal Name
Journal Of Ecological Engineering
Microwave assisted production of biodiesel using CaO nano-catalyst produced from mango fallen leaves extract
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Ibero- American Journal Of Exercise And Sports Psychology
THE EFFECT OF SPECIAL EXERCISES USING TWO DESIGNED DEVICES IN DEVELOPING SOME DEFENSIVE HANDBALL SKILLS
...Show More Authors

Scopus (4)
Scopus
Publication Date
Tue Feb 17 2026
Journal Name
University Of Anbar Sport And Physical Education Sciences
The effect of using aids in spatial sense perception Throwing weights under 18 years old
...Show More Authors

View Publication