Laboratory model tests were performed to investigate the behavior of shallow and inclined skirted foundations placed on sandy soil with R.D%=30 and the extent of the impact of the positive and negative eccentric-inclined loading effect on them. To achieve the experimental tests, it was used a box of (600×600) mm cross-sectional and 600mm in height and a square footing of (50*50) mm and 10 mm in thickness attached to the skirt with Ds=0.5B and various an angle of (10°, 20°, 30°). The results showed that using skirts leads to a significant improvement in load-carrying capacity and decreased settlement. In addition, when the skirt angle increased, the ultimate load improved. Load-carrying capacity decreased with increasing eccentricity and load inclination. For load inclination (Beta) 15° when the eccentricity changed from e=0.15B to e=0.05B, the load improvement percentages were (323.2 to 263%) and (214 to 220%). The settlement reduction factor was (83 to 78%) and (62 to 58%) for positive and negative eccentric-inclined loading, respectively. Also, the result showed that the positive effect on reducing soil-bearing capacity is more than the negative. Increasing eccentricity increases the improvement percentage for positive eccentric-inclined load and decreases for the case of negative eccentric-inclined load. Increased skirt angle will increase the Improvement factor (IR). When the skirt angle increased from 10° to 30° for an improved foundation with load angles of 5°, 10°, and 15°, the improvement factor (IR) increased from (2.53, 2.51, 2.4) to (3.45, 3.65, 3.97) and (2.43, 2.58, 2.54) to (4, 4.63, 5.3) for both negative and positive eccentric-inclined load respectively and settlement reduction factor for load angle 15° and skirt angle increase from 10° to 30° were 34% and 27% for positive and negative eccentric-inclined load respectively. The (IR) for the positive eccentric-inclined load is more than the negative eccentric-inclined load for all cases. In addition, the skirt angle of 30° significantly improved the improvement factor (IR).
This work investigates a simulation model of an underwater optical wireless communication (UOWC) system. Several water scenarios are considered: Harbor I (HA-I), Harbor II (HA-II), Coastal Ocean (CO), Clear Ocean (CL), and Pure Sea (PU). A laser diode (LD) with modulation schemes (NRZ-OOK) transmits data at various speeds of 2.5 Gbps, 5 Gbps, and 10 Gbps. To identify the optical signal, a single-photon detection (SPD), APD and PIN photodiodes are utilized. The analytical evaluation of the performance is executed using Q-factor, received power and bit error rate (BER). According to the results, the PU achieved an underwater distance of 35.5 m, 35 m, 34.5 m, for data tran
the banks are one of the public services that must be available in the city to ensure easy financial dealings between citizens and state departments and between the state departments with each other and between the citizens themselves and to ensure easy access to it, so it is very important to choose the best location for the bank, which can serve the largest number of The population achieves easy access. Due to the difficulty of obtaining accurate information dealing with the exact coordinates and according to the country's specific projection, the researcher will resort to the default work using some of the files available in the arcview program
ABSTRACT: Ultimate bearing capacity of soft ground reinforced with stone column was recently predicted using various artificial intelligence technologies such as artificial neural network because of all the advantages that they can offer in minimizing time, effort and cost. As well as, most of applied theories or predicted formulas deduced analytically from previous studies were feasible only for a particular testing environment and do not match other field or laboratory datasets. However, the performance of such techniques depends largely on input parameters that really affect the target output and missing of any parameter can lead to inaccurate results and give a false indicator. In the current study, data were collected from previous rel
... Show MoreSome auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones. The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent
... Show MoreThe phenomenon of informal building Spread recently in Iraqi residential areas, in general, and in Baghdad, in particular, due to the urgent housing need, on the one hand, and lack of commitment to building controls, on the other hand, to highlight the phenomenon of uncommitted building to controls and housing governing legislation in Iraq, leading to heterogeneity in both building densities and plot areas, and disorder in the urban fabric and urban escape of those areas. Research problem identified as the absence of a clear vision about the General aspects of the phenomenon of informal building in residential street scene, and the role of designed housing projects as a substitute for informal building in built residential areas. The des
... Show MoreFear, harvesting, hunting cooperation, and antipredator behavior are all important subjects in ecology. As a result, a modified Leslie-Gower prey-predator model containing these biological aspects is mathematically constructed, when the predation processes are described using the Beddington-DeAngelis type of functional response. The solution's positivity and boundedness are studied. The qualitative characteristics of the model are explored, including stability, persistence, and bifurcation analysis. To verify the gained theoretical findings and comprehend the consequences of modifying the system's parameters on their dynamical behavior, a detailed numerical investigation is carried out using MATLAB and Mathematica. It is discovered that the
... Show MoreThe study aimed to measure the phsycological tolerance and self-efficacy among the students of Baghdad university and knon the significant differences in psychological tolerance and self-efficacy according to the variables (Gender-Specialization)and the interaction between themas well as the study aimed to identify the strength and direction of the relationship between psychological tolerance and self-efficacy of the study sampleincluded asample of the current study(370) students from grades four ,the researcher used the measure of psychological tolerance and self-efficacy prepared by the researcher ,and the results showed that college students Generally have adegree of psychological tolerance and that there are statistically sig
... Show MoreThe COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt