In the geotechnical and terramechanical engineering applications, precise understandings are yet to be established on the off-road structures interacting with complex soil profiles. Several theoretical and experimental approaches have been used to measure the ultimate bearing capacity of the layered soil, but with a significant level of differences depending on the failure mechanisms assumed. Furthermore, local displacement fields in layered soils are not yet studied well. Here, the bearing capacity of a dense sand layer overlying loose sand beneath a rigid beam is studied under the plain-strain condition. The study employs using digital particle image velocimetry (DPIV) and finite element method (FEM) simulations. In the FEM, an experimentally characterised constitutive relation of the sand grains is fed as an input. The results of the displacement fields of the layered soil based DPIV and FEM simulations agreed well. From the DPIV experiments, a correlation between the slip surface angle and the thickness of the dense sand layer has been determined. Using this, a new and simple approach is proposed to predict theoretically the ultimate bearing capacity of the layered sand. The approach presented here could be extended more easily for analysing other complex soil profiles in the ground-structure interactions in future
Kinetics study on the phenol oxidation by catalytic wet air oxidation (CWAO) using CuO.NiO/Al2O3 as heterogeneous catalyst is presented. 4 g/l phenol solution of pH 7.3 was oxidized in a trickle bed reactor with gas flow rate of 80% stochiometric excess (S.E).. In order to verify the proposed kinetics, a series of CWAO experimental tests were done at two temperatures (140 and 160° C), oxygen partial pressures (9 and 12 bar), and weight hourly space velocity (WHSV) (1, 1.5, 2, 2.5, and 3 h-1). According to Power Law, the reaction orders are found to be approximately 1 and 0.5 with respect to phenol concentration and oxygen solubility, respectively. These values favorably compare with those cited in the literature for intrinsic kinetics,
... Show MoreAccording to the famous saying of the medieval physician Paracelsus, "There is no substance without poison. Only the dose determines the extent of the toxic effect." Here, the effect of monosodium glutamate (MSG) on human health and the risks to the health of its frequent use in the short term was addressed and the long term was evaluated according to the studies of several researchers specializing in this regard. Monosodium glutamate (MSG) is known as one of the most popular food additives that classified as a flavor enhancer. Parts of the evidence were reviewed from the literature explaining its effect on immune system cells in addition to metabolic disorders by exposing individuals to obesity and what is known as metabolic syndrome, as w
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreA solar updraft tower power plant (solar tower) is a solar thermal power plant that utilizes a combination of solar
air collector and central updraft tube to generate an induced convective flow which drives pressure staged turbines to generate electricity.
This paper presents practical results of a prototype of a solar chimney with thermal mass, where the glass surface is replaced by transparence plastic cover. The study focused on chimney's basements kind effect on collected air temperatures. Three basements were used: concrete, black concrete and black pebbles basements. The study was conducted in Baghdad from August to November 2009.
The results show that the best chimney efficiency attaine
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis work presents an experimental study of heat transfer and flow of distilled water and metal oxide nanofluid Fe3O4-distilled water at concentrations of (φ = 0.3, 0.6, 0.9 %) by volume in a horizontal pipe with constant magnetic field. All the tests are carried out with Reynolds number range (2900-9820) and uniform heat flux (11262-19562 W/m2). The results show that, the nanofluid concentration and magnetic intensity increase, the Nusselt number increases. The maximum enhancement in Nusselt number with magnetic nanofluid is (5.4 %, 26.4 %, 42.7 %) for volume concentration (0.3, 0.6, 0.9 %) respectively. The enhancement is maximized with magnetic intensity (0.1, 0.2, 0.3 tesla) respectively to (43.9, 44
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIn this paper a prey - predator model with harvesting on predator species with infectious disease in prey population only has been proposed and analyzed. Further, in this model, Holling type-IV functional response for the predation of susceptible prey and Lotka-Volterra functional response for the predation of infected prey as well as linear incidence rate for describing the transition of disease are used. Our aim is to study the effect of harvesting and disease on the dynamics of this model.