In order to understand the effect of (length of pile / diameter of pile) ratio on the load carrying capacity and settlement reduction behavior of piled raft resting on loose sand, laboratory model tests were conducted on small-scale models. The parameters studied were the effect of pile length and the number of piles. The load settlement behavior obtained from the tests has been validated by using 3-D finite element in ABAQUS program, was adopted to understand the load carrying response of piled raft and settlement reduction. The results of experimental work show that the increase in (Lp/dp) ratio led to increase in load carrying capacity by piled raft from (19.75 to 29.35%), (14.18 to 28.87%) and (0 to 16.49%) , the maximum load carried by piles decrease from (9.1 to 22.72%), (15.79 to 47.37%) and (44 to 81.05%) and the response of settlement piled raft decrease from (16.67 to 23.33%), (9.09 to 39.39%) and (30%) with increase the number of piles from 4 to (6 and 9) and (length of pile / diameter of pile) ratio increase to (14.14 and 21.2), respectively. The numerical and model test results are found to be in a good agreement
In this paper, the effect of wear in the fluid film journal bearings on the dynamic stability of rotor bearing system has been studied depending on the development of new analytical equations for motion, instability threshold speed and steady state harmonic response for rotor with offset disc supported by worn journal bearings. Finite element method had been used for modeling the rotor bearing system. The analytical model is verified by comparing its results with that obtained numerically for a rotor supported on the short bearings. The analytical and numerical results showed good agreement with about 8.5% percentage error in the value of critical speed and about 3.5% percentage error in the value of harmonic response. T
... Show MoreThis paper develops a nonlinear transient three-dimensional heat transfer finite element model and a rate independent three-dimensional deformation model, developed for the CO2 laser welding simulations in Al-6061-T6 alloy. Simulations are performed using an indirect coupled thermal-structural method for the process of welding. Temperature-dependent thermal properties of Al-6061-T6, effect of latent heat of fusion, and the convective and radiative boundary conditions are included in the model. The heat input to the model is assumed to be a Gaussian heat source. The finite element code ANSYS12, along with a few FORTRAN subroutines, are employed to obtain the numerical results. The benefit of the proposed methodology is that it
... Show MoreCarbonate-clastic succession which includes the Shu'aiba, Nahr Umr and Mauddud formations are representing a part of the Barremian-Aptian Sequence (Wasi'a Group). The present study includes three boreholes (Ba-1, 4 and 8) within the Balad Oil Field. The study area is located in central Iraq. This field represents a subsurface anticline with a northwest to southeast direction axis within the Mesopotamian Zone. Eight types of microfacies were recognized in the succession of the Mauddud and Shu’aiba formations. These microfacies represent shallow open marine, restricted and semi-restricted, reef - back reef, deep open marine and basinal depositional environments. While Nahr Umr Formation includes two successions, the first is the upp
... Show MoreBackground: Behçet’s disease (BD) is a disorder of systemic inflammatory condition. Its important features are represented by recurrent oral, genital ulcerations and eye lesions. Aims. The purpose of the current study was to evaluate and compare cytological changes using morphometric analysis of the exfoliated buccal mucosal cells in Behçet’s disease patients and healthy controls, and to evaluate the clinical characteristics of Behçet’s disease. Methods. Twenty five Behçet’s disease patients have been compared to 25 healthy volunteers as a control group. Papanicolaou stain was used for staining the smears taken from buccal epithelial cells to be analyzed cytomorphometrically. The image analysis sof
... Show MoreThe research aims to identify the tax policy strategy adopted in Iraq after the change of the tax system in 2003 and beyond, and then make a comparison of the two strategies on corporate data whether they are charged with progressive tax rates and after the change of the system as the tax rates became fixed, and then indicate the changes In the tax proceeds, and knowing the imensions of the approved tax policy, is it a tax reform strategy or a strategy to attract investments.The research started from the problem of exposure of the Iraqi tax system to several changes, as this led to a reflection on the technical organization of taxes, in terms of the tax rate.The descriptive analytical approach was chosen to study the actual reality of th
... Show MoreSingle phase capacitor-run induction motors (IMs) are used in various applications such as home appliances and machine tools; they are affected by the sags or swells and any fault that can lead to disturb the supply and make it produce rms voltage below or above the rated motor voltage, which is 220V. A control system is designed to regulate the output voltage of the converter irrespective to the variation of the load and within a specific range of supply voltage variation. The steady-state equivalent circuit of the Buck-Boost chopper type AC voltage regulator, as well as the analysis of this circuit are presented in this paper. Switching device for the regulator is an IGBT Module. The proposed chopper uses pulse width modulation (PWM) c
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More