- The sandy soil with high gypsum content (usually referred to as gypseous soil) covers vast area in south, east, middle and west regions of Iraq, such soil possess a type of cohesive forces when attached with optimum amount of water, then compacted and allowed to cure, but losses its strength when flooded with water again. Much work on earth reinforcement was published which concentrate on the gain in bearing capacity in the reinforced layer using different types of cohesive or cohesion less soil and various types of reinforcement such as plastic, metal, grids, and synthetic textile. Little attention was paid to there enforce gypseous soil. The objective of this work is to study the interaction between such soil and reinforcement strips and determine the frictional stress between there enforcement strips and gypseous soil at its cured condition and at the asphalt stabilized condition through the pullout technique. This work presents a laboratory investigation on earth reinforced embankment model box. The box was filled with gypseous soil compacted in layers to a predetermined density. Aluminum and plastic reinforcement strips of variable geometric types were embedded at each layer. After compaction of each layer, and filling the box, the strips were subjected to pullout test to determine the frictional resistance between the soil and the strips at different spacing in the vertical and horizontal planes. The same procedure was repeated on another box after subjecting the embankment to curing for 10 days. A third embankment model was constructed using asphalt stabilized gypseous soil. Finally, the frictional behavior of the models was evaluated and the reinforcing strips behavior and capabilities were determined
Naber and toning in the modern Arab poetry Mahmoud Darwish, a model
In this article we study a single stochastic process model for the evaluate the assets pricing and stock.,On of the models le'vy . depending on the so –called Brownian subordinate as it has been depending on the so-called Normal Inverse Gaussian (NIG). this article aims as the estimate that the parameters of his model using my way (MME,MLE) and then employ those estimate of the parameters is the study of stock returns and evaluate asset pricing for both the united Bank and Bank of North which their data were taken from the Iraq stock Exchange.
which showed the results to a preference MLE on MME based on the standard of comparison the average square e
... Show MoreMeasurement of construction performance is essential to a clear image of the present situation. This monitoring by the management team is necessary to identify locations where performance is exceptionally excellent or poor and to identify the primary reasons so that the lessons gained may be exported to the firm and its progress strengthened. This research attempts to construct an integrated mathematical model utilizing one of the recent methodologies for dealing with the fuzzy representation of experts’ knowledge and judgment considering hesitancy called spherical fuzzy analytic hierarchy process (SFAHP) method to assess the contractor’s performance per the project performance pa
The European Unit has never been affected by a serious phenomena as the phenomena of the advancing of the far right parties. Though these parties vary in their impact in their original countries, they agree on one important issue which is the deconstruction of the European unit and limiting its supernational powers. These increasing popular parties aim at more national independence in decision making away from the decisions taken by Brussels. Moreover, they criticize the financial and administrative corruption accompanied many of the rescuing procedures directed for example towards countries like Greece and Spain during the international economic crisis. This failure nourishes many of the negative feelings against the European unit which
... Show MoreThe aim of this paper is to design a PID controller based on an on-line tuning bat optimization algorithm for the step-down DC/DC buck converter system which is used in the battery operation of the mobile applications. In this paper, the bat optimization algorithm has been utilized to obtain the optimal parameters of the PID controller as a simple and fast on-line tuning technique to get the best control action for the system. The simulation results using (Matlab Package) show the robustness and the effectiveness of the proposed control system in terms of obtaining a suitable voltage control action as a smooth and unsaturated state of the buck converter input voltage of ( ) volt that will stabilize the buck converter sys
... Show MoreThe novel has recently received great attention from readers and before them writers, due to the role it is playing, and this indicates an important rule, which is whenever there is art or creativity, there must be a criticism of its own, and this criticism is certainly no less important than its owner, so we find There are critics who have their distinguished literary position in following up the narrative development, and trying to describe the transformation of its elements, including Professor Fadel Thamer, and whoever wants to approach an element of the novel as an explorer, he must stand on the visions of this critic about it, and this is what made us take the element (personality) Tracking the most important opinions of the critic
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreScheduling considered being one of the most fundamental and essential bases of the project management. Several methods are used for project scheduling such as CPM, PERT and GERT. Since too many uncertainties are involved in methods for estimating the duration and cost of activities, these methods lack the capability of modeling practical projects. Although schedules can be developed for construction projects at early stage, there is always a possibility for unexpected material or technical shortages during construction stage. The objective of this research is to build a fuzzy mathematical model including time cost tradeoff and resource constraints analysis to be applied concurrently. The proposed model has been formulated using fuzzy the
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More