Gypseous soil covers approximately 30% of Iraqi lands and is widely used in geotechnical and construction engineering as it is. The demand for residential complexes has increased, so one of the significant challenges in studying gypsum soil due to its unique behavior is understanding its interaction with foundations, such as strip and square footing. This is because there is a lack of experiments that provide total displacement diagrams or failure envelopes, which are well-considered for non-problematic soil. The aim is to address a comprehensive understanding of the micromechanical properties of dry, saturated, and treated gypseous sandy soils and to analyze the interaction of strip base with this type of soil using particle image velocimetry (PIV) measurement and Plaxis 3D simulation. The results showed that high-resolution digital cameras captured soil deformation using PIV, displacement fields, and velocity vectors were generated, which helped identify different sand movement zones. Further, PIV showed punching and general shear failure in uncontaminated and soaked contaminated gypsum soils, respectively. Moreover, the Plaxis results corresponded well with the PIV, as material behavior models are essentially simplified representations of the actual behavior of footing and soil. Understanding soil deformation behavior is crucial for accurate engineering calculations and designs, making these findings valuable for geotechnical and construction engineering applications. Doi: 10.28991/CEJ-2024-010-07-016 Full Text: PDF
Abstract
That Iraq's dependence on the revenues of the oil product in financing its development programs and growth rates , Making the economy affected by external forces represented by fluctuations in crude oil prices in the global market, Which is directly reflected on the performance and efficiency of the Iraqi economy.
The study adopted its objectives to analyze the time series for the period (1988 - 2015) through the use of standard and statistical methods, Four standard models were estimated to reach those targets, Where the results of the stability test showed instability of most variables at their original level, But to achieve stability when taking the first differences, While the result
... Show MoreThe present work aims to study the combustion characteristics related to syngas-diesel dual-fuel engine operates at lambda value of 1.6 operated by five different replacement ratios (RR) of syngas with diesel, which are (10%, 20%, 30 %, 40 % and 50%). ANSYS Workbench (CFD) was used for simulating the combustion of the syngas-diesel dual-fuel engine. The numerical simulations were carried out on the Ricardo-Hydra diesel engine. The simulation results revealed that the diesel engine’s combustion efficiency was enhanced by increasing the diesel replacement with Syngas fuel. The diesel engine’s combustion efficiency The peak in-cylinder temperature was enhanced from 915.9K to 2790.5K
The statistical distributions study aimed to obtain on best descriptions of variable sets phenomena, which each of them got one behavior of that distributions . The estimation operations study for that distributions considered of important things which could n't canceled in variable behavior study, as result this research came as trial for reaching to best method for information distribution estimation which is generalized linear failure rate distribution, throughout studying the theoretical sides by depending on statistical posteriori methods like greatest ability, minimum squares method and Mixing method (suggested method).
The research
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More
Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from
... Show MoreDam break is series phenomenon that can result in fatal consequences and loss of properties. Unfortunately, the observed consequences can only be available after the dam breaks. Therefore, it is important to anticipate what will happen prior to dam break to issue suitable warning and locate the possible risk areas. This study attempts to simulate the case of dam break in Blue Nile at Roseires dam and see its consequences downstream. Roseires dam lies at a distance of 630 km south of Khartoum, Sennar dam lies at about 260 km downstream of Roseires dam. In this study hydraulic model is developed based of Hydraulic Engineering Centre (HEC), River Analysis System (RAS), and HEC- RAS. The HEC-RAS based model is calibrated and validated usi
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.
First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .
&nbs
... Show More