The construction of embankment for roadway interchange system at urban area is restricted due to the large geometry requirements, since the value of land required for such construction is high, and the area available is limited as compared to rural area. One of the optimum solutions to such problem is the earth reinforcement technique which requires a limited area for embankment construction. Gypseous soil from Al-Anbar governorate area was obtained and subjected to various physical and chemical analysis to determine it is properties. A laboratory model box of 50x50x25 cm was used as a representative embankment; soil has been compacted in five layers at maximum dry density (modified compaction) and an aluminum reinforcement strips were introduced between layers. The model was subjected to cyclic loading and the vertical and lateral deformations were detected at different stages of loading cycles using LVDT. The reinforced soil embankment under soaking condition exhibited vertical settlement at the top surface was (12.55 mm) while the lateral displacements at (1st, 3rd layer) were (2.18, 1.32) mm respectively at (47 load cycles).For reinforced gypseous soil, embankment without soaking cured for 24 hours, the Number of load cycles was found to be (165) loading cycles with vertical displacement (9.12 mm), that means an improvement of 59%. Accordingly, the lateral displacement in 1st and 3rd layers were (3.28, 2.59) mm respectively which observes improvement by (28% and 5%) respectively. The rates of improvement are taken with respect to the reinforced pure dry soil sample.
Some experiments need to know the extent of their usefulness to continue providing them or not. This is done through the fuzzy regression discontinuous model, where the Epanechnikov Kernel and Triangular Kernel were used to estimate the model by generating data from the Monte Carlo experiment and comparing the results obtained. It was found that the. Epanechnikov Kernel has a least mean squared error.
Operated Alandziahih "drift theory" as a science talk in most of the cash and technical studies in the early twentieth century, making him and the sciences, arts and culture both fields of experiences, in an attempt to explore the institutions that theory, a number of laws which took control in the internal structures of those acts, resulting in for those institutions to be actively contribute their ideas to guide the pace on the right track. And thus lay the foundations of this theory, which was a big affair in the early twentieth century and still vigorous pace to this day, particularly their applications in various fields of the arts.Although each type of Arts, both in the composition or the theater or means of communication, took joi
... Show MoreAbstract
This study talks about a wonderful Qur'anic style. relates to one of the methods used in it. And it's the rhetorical style: ''Affirmative say''. It is useful in arguing with the opponent, nullifying his reasoning, and proving the opposite meaning of the opponent. The study will be conducted from a Qur'anic perspective based on the study of examples of it, and partly in interpretive treatment through the book of editing and enlightenment of Taher Ibn Ashour, known for his art in matters of rhetoric and methods of controversy. This is with the rooting of this issue, and the relationship of industrial sciences to it as a Qur'anic style.
Keywords: ''Affirmative say, style, Qur'anic rhetoric, Arabic rhetoric, Co
... Show MoreTo damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The res
... Show MoreA harvested prey-predator model with infectious disease in preyis investigated. It is assumed that the predator feeds on the infected prey only according to Holling type-II functional response. The existence, uniqueness and boundedness of the solution of the model are investigated. The local stability analysis of the harvested prey-predator model is carried out. The necessary and sufficient conditions for the persistence of the model are also obtained. Finally, the global dynamics of this model is investigated analytically as well as numerically. It is observed that, the model have different types of dynamical behaviors including chaos.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A
... Show MoreA study has been performed to compare the beddings in which ductile iron pipes are buried. In water transmission systems, bends are usually used in the pipes. According to the prescribed layout, at these bends, unbalanced thrust forces are generated that must be confronted to prevent the separation of the bend from the pipe. The bed condition is a critical and important factor in providing the opposite force to the thrust forces in the restraint joint system. Due to the interaction between the native soil and the bedding layers in which the pipe is buried and the different characteristics between them. Also, the interaction with the pipe material makes it difficult to calculate the real forces opposite to the thrust forces and the way they
... Show MoreBackground: There is a strong desire of adolescent to have a peer group and to be appreciated and also to become a member of this group which can affect one each other. There for; encourage, adapting,and imitating of friends and group consider as the main reasons behind starting of smoking among youngsters. Smoking habits in the family were found tobe acause of smoking pressure among adolescentas peer pressure. Smoking habit may be started before 18 years of age in most adult smokers.
Objectives: To study the effect of peer pressure and family smoking habiton the prevalence of smoking among secondary school students.
Type of the study: A cross
... Show More