Preferred Language
Articles
/
HhYYCocBVTCNdQwCczES
Proposed Design Charts for Reinforced Concrete Spread Foundations Subjected to Concentric Load
...Show More Authors

The design of reinforced concrete spread foundations mainly depends on soil bearing capacity, loading value, and column size. So for each design case, tiresome calculations and time consumption are needed. In this paper, generalized design charts are presented and plotted according to derivations based on the ACI 318 M-2019 Code. These charts could be used directly by the structural designers to estimate the column size, foundation thickness, and dimensions as well as the foundation reinforcement under a certain given concentric load assuming a uniformly distributed contact pressure underneath the foundation. Of noteworthy, these charts are oriented to deal with square isolated footings with a square concentric column, covering reasonable ranges of applied concentric load, column steel reinforcement ratio, and allowable soil bearing capacity. All derivations included in this research are based on assuming a practical concrete design compressive strength of 21 MPa and steel yielding stress of 420 MPa for both columns and foundations.

Crossref
View Publication
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
An Educational Model in Journalistic Production Course to Develop the Creative Thinking Skills of Printing Design Students
...Show More Authors

The printing designer's creative thinking is a deliberate  mental process based on specific skills that stimulate the motivation of  the student to learn and call for  new information for the investigation and research to discover the problems and attitudes and through reformulating the experience in new patterns depending on the active imagination and the flexible scientific thinking through providing the largest number possible  of various unfamiliar  printing design models, and testing their suitability and then readjusting the results with the availability of  suitable educational, learning and academic atmosphere.

The designer's creative thinking depends on main skills. Fluency skill is to put t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Estimate missing value by use analyses of covariance method for split block-design
...Show More Authors

The research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Proposed methods of image recognition depend on the PCA
...Show More Authors

This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Public Policy Education in Iraq / Reality Challenges and Proposed
...Show More Authors

The policy issue in all countries of the world is concerned with government and research because it has the ability to reveal many of the problems facing the state and its organizational and scientific capabilities in the development of solutions and appropriate treatments that go beyond random and improvisational reactions, As a result of this interest, many studies have attempted to conceptualize and academicism it. The concept of public policy has been linked to various aspects of social life such as social, economic, educational, agricultural or other aspects. Public policy, regardless of its meaning or its relation to aspects of life, refers to the systematic thinking that directs the behavior and actions of the state, organization

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Asymmetry of accounting information - the reasons and proposed treatments
...Show More Authors

The research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So,  the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire   in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs ​​in the laws and regula

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jan 06 2024
Journal Name
International Journal Of Applied Engineering & Technology
A PROPOSED LIGHTWEIGHT BLOCK CIPHER SYSTEM EMPLOYING DNA CODES
...Show More Authors

Publication Date
Sun Dec 03 2017
Journal Name
Al-khwarizmi Engineering Journal
Performance of Turbo-Codes with Some Proposed Interleaver Schemes
...Show More Authors

This paper describes a number of new interleaving strategies based on the golden section. The new interleavers are called golden relative prime interleavers, golden interleavers, and dithered golden interleavers. The latter two approaches involve sorting a real-valued vector derived from the golden section. Random and so-called “spread” interleavers are also considered. Turbo-code performance results are presented and compared for the various interleaving strategies. Of the interleavers considered, the dithered golden interleaver typically provides the best performance, especially for low code rates and large block sizes. The golden relative prime interleaver is shown to work surprisingly well for high puncture rates. These interleav

... Show More
View Publication Preview PDF