The current study involves placing 135 boreholes drilled to a depth of 10 m below the existing ground level. Three standard penetration tests (SPT) are performed at depths of 1.5, 6, and 9.5 m for each borehole. To produce thematic maps with coordinates and depths for the bearing capacity variation of the soil, a numerical analysis was conducted using MATLAB software. Despite several-order interpolation polynomials being used to estimate the bearing capacity of soil, the first-order polynomial was the best among the other trials due to its simplicity and fast calculations. Additionally, the root mean squared error (RMSE) was almost the same for the all of the tried models. The results of the study can be summarized by the production
... Show MoreThe information required for construction quantities surveying is not only generated by various participants in different construction phases but also stored in different forms including graphics, text, tables, or various combinations of the three. To report a bill of quantities (BOQ), the project manager has to continuously excerpt information from various resources and record it on papers. Without adequate staff and time, this repetitive and tedious process is difficult for the project manager to handle properly and thus reduces the effectiveness and the accuracy of the quantities surveying process which creates problems during the design, tender, and construction supervision of construction projects for designers and contractors pract
... Show MoreIn this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate
... Show MoreIn this article, a numerical method integrated with statistical data simulation technique is introduced to solve a nonlinear system of ordinary differential equations with multiple random variable coefficients. The utilization of Monte Carlo simulation with central divided difference formula of finite difference (FD) method is repeated n times to simulate values of the variable coefficients as random sampling instead being limited as real values with respect to time. The mean of the n final solutions via this integrated technique, named in short as mean Monte Carlo finite difference (MMCFD) method, represents the final solution of the system. This method is proposed for the first time to calculate the numerical solution obtained fo
... Show More
Abstract
This research studies Abu Baker Al-Siddiq’s commandments to the leaders of his armies. The research is organized into an Introduction, three sections, and a Conclusion.
The Introduction presents a definition of Style and Commandment terminologies. It also presents a brief biography of Abu Baker Al-Siddiq may Allah be pleased with him.
The first section explains the characteristics of the Composition and its rhetorical significance. In this Section, I study the types of predicate and the methods of construction in Abu Baker’s commandments and the rhetoric in using the connection and disconnection modifiers in his expressions.
The second section e
... Show More|
Theoretical spectroscopic studies of beryllium oxide has been carried out, potential energy curves for ground states X1Σ+ and exited states A1Π , B1Σ+ by using two functions Morse and and Varshni compared with experimental results. The potentials of this molecule are agreement with experimental results. The Fortrat Parabola corrcponding to and branches were determind in the range 1<J<20 for the (0-0) band. It was found that for electronic transition A1Π- X1Σ+ the bands head lies in branche of Fortrat p |
The main goal of this paper is to introduce the higher derivatives multivalent harmonic function class, which is defined by the general linear operator. As a result, geometric properties such as coefficient estimation, convex combination, extreme point, distortion theorem and convolution property are obtained. Finally, we show that this class is invariant under the Bernandi-Libera-Livingston integral for harmonic functions.
In this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.
Shell model and Hartree-Fock calculations have been adopted to study the elastic and inelastic electron scattering form factors for 25Mg nucleus. The wave functions for this nucleus have been utilized from the shell model using USDA two-body effective interaction for this nucleus with the sd shell model space. On the other hand, the SkXcsb Skyrme parameterization has been used within the Hartree-Fock method to get the single-particle potential which is used to calculate the single-particle matrix elements. The calculated form factors have been compared with available experimental data.
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More