This study is directed at investigating the liquefaction potential within earth dams using numerical modelling by two-dimensional finite element analyses method for considering the Makhool earth dam on the Tigris River in Iraq. The effect of peak ground acceleration of 0.02g, 0.04g, 0.06g, and 0.08g is viewed for a shell, and the crest is presented for all scaled earthquake duration 25 s, 50 s, 75 s, and 100 s. The current study program comprises selecting a representative history point within the Makhool earth dam as a case study. Many points were allocated at different locations within the shell and crest to observe the fluctuation in the factor of safety against liquefaction. The seepage analysis results viewed graphically for the operating water level of 146 meters above sea level (m.a.s.l.) is consistent with the previous research of such earth dams. Also, it can be seen from the factor of safety against liquefaction profiles that there is a trend. The factor of safety against liquefaction at a given selected point decreases with an increase in the earthquake duration. Also, the factor of safety against liquefaction decreases with peak ground accelerations (g). Yet, what is not mentioned here is that similar trends were noticed in other water levels. Conversely, this is not clear in crest since such behavior is inherently dependent upon the mechanism of strain energy accumulation in the equation of motion. The computational approach used here provides strong findings for analysing other earth dams in the future.
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreKidney tumors are of different types having different characteristics and also remain challenging in the field of biomedicine. It becomes very important to detect the tumor and classify it at the early stage so that appropriate treatment can be planned. Accurate estimation of kidney tumor volume is essential for clinical diagnoses and therapeutic decisions related to renal diseases. The main objective of this research is to use the Computer-Aided Diagnosis (CAD) algorithms to help the early detection of kidney tumors that addresses the challenges of accurate kidney tumor volume estimation caused by extensive variations in kidney shape, size and orientation across subjects.
In this paper, have tried to implement an automated segmentati
Chaotic features of nuclear energy spectrum in 68Ge nucleus are investigated by nuclear shell model. The energies are calculated through doing shell model calculations employing the OXBASH computer code with effective interaction of F5PVH. The 68Ge nucleus is supposed to have an inert core of 56Ni with 12 nucleons (4 protons and 8 neutrons) move in the f5p-model space ( and ). The nuclear level density of considered classes of states is seen to have a Gaussian form, which is in accord with the prediction of other theoretical studies. The statistical fluctuations of the energy spectrum (the level spacing P(s) and the Dyson-Mehta (or statistics) are well described by the Gaussian orthogonal ens
... Show MoreSocial reform is the main pillar of the organization of societies. Therefore, all religions and theories were directed to focus on this aspect as the most important element for the development of economic and cultural development. In addition to the analysis and application of the Islamic Sharia, he did not present a theory, but offered real solutions and remedies to the crises in our Arab and Islamic societies alike, despite the criticism directed at him. Z his opinions.
Pregnancy- including hypertension(PIH), also known as preeclampsia, is one of the major causes of maternal and fetal death. This study was carried out on 30 pregnant women with preeclampsia and 30 healthy pregnant women as control ranging in age mean ±SD (28.84±3.55) years , BMI (76.80±9.78) Kg/m2 and gestation age(30.82±0.75)week. The aim of this research was studied the plasma Metanephrine level and other biochemical parameters such as Hemoglobin(Hb), serum Protein, S. Albumin, Globulin, Albumin/Globulin ratio (Alb/Glu. ratio), S.Glutamate Pyruvate aminotransferase (GPT), S.Glutamate Oxaloacetate aminotransferase(GOT). The obtained results have been compared with 30 healthy pregnant women as control group. The result showed
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon the best of the messengers, Muhammad, and all his family and companions. And after:
For when I had the pleasure of looking at the chapters of the Noble Qur’an, and its evident signs, my view fell on one of its brightest verses, and it is the Almighty saying: ﭽﯜ ﯝ ﯞ ﯟ ﯠ ﯡ ﯢ ﯣ ﯤ ﯥ ﯦ ﯧ ﯨﭼ (). The tag: (God’s Greatness in Creating a Hoopoe). The research methodology required that I divide it into four sections:
The first topic: an overview of birds.
The second topic: the characteristics and characteristics of hoopoe.
The third topic: the logic of the bird.
The fourth topic: Praise the bird.
This has relied in my research on
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Abstract
All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t
... Show More