The improvement of the mechanical soil characteristics of jet grouting technique is very attractive. The jet grouted soil cement columns in soft is a complicated issue because it depends on a number of factors such as, soil nature, mixture, influence among soil and grouting materials, jetting force of nozzle, jet grouting and water flow rate, rotation and lifting speed. This paper discusses the estimation of shear strength parameters of soil-cement column (soilcrete) in soft clayey soil based on the relationships between the unconfined compressive and split tensile strength for the soilcrete and the effect of the jet grouting and water pressure in the values of cohesion and internal friction. For this reason, theoretical and field work models have been developed. The relation between split tensile and unconfined compressive strength results were used to draw a Mohr’s circle and failure enveloped to define the shear strength parameters of soilcrete. According to that, the results indicate that the resistance of the jet grout columns increases by increasing the nominal resistance of the grouting material (cement), water and jet grouting pressure. The shear resistance variables are increased by increasing the unconfined compressive and tensile strength of the jetting column. The value of the unconfined compressive strength ranges from (2.78-5.52 MPa). While the internal friction angle varies from 38° to 44°. On the other hand, the tensile strength is increased by increasing the unconfined compressive strength and ranges from (0.66-1.02 MPa).
t. The current study was conducted on the umbilical cord blood of newborns in the Banks Hospital in Baghdad, Diyala, and Khalis in Diyala, where the study included 90 samples of blood, and samples were collected for the period from the 1st of October;2020 to The first of February;2021 AD, where the study included measuring levels of interleukin-6;Adiponectin,glucose and bilirubin in the blood, comparison study between the study variables with the child's weight (greater than 3 kg),(less or equal 3 kg),the mother's age (greater than 25 years, less or equal to 25 years),the sex of the child (male, female).The results of our study showed that there were no significant differences between the variables of the current study between the two sex
... Show MoreCadmium sulfide (CdS) thin films with n-type semiconductor characteristics were prepared by flash evaporating method on glass substrates. Some films were annealed at 250 oC for 1hr in air. The thicknesses of the films was estimated to be 0.5µ by the spectrometer measurement. Structural, morphological, electrical, optical and photoconductivity properties of CdS films have been investigated by X-ray diffraction, AFM, the Hall effect, optical transmittance spectra and photoconductivity analysis, respectively. X-ray diffraction (XRD) pattern shows that CdS films are in the stable hexagonal crystalline structure. Using Debye Scherrerś formula, the average grain size for the samples was found to be 26 nm. The transmittance of the
... Show MoreThe experiment was carried out in College of Agricultural Engineering Sciences, University of Baghdad during November 1, 2019 to June 1, 2020. The experiment was designed according to a randomized complete block design. Each block contained 18 experimental units that included the three study factors. The first factor interaction between two inoculum densities and application methods, three levels control, treatment of seeds inoculation with 5g plant and treatment of seedlings inoculation whith 30g plant . The second factor was three -1 -1concentrations of spraying of kinetin 0, 75 and 150 mg L , and third factor include two levels of organic manure) and addition of fertilizer 2% of -1 the weight of the soil (O2). The results showed a signif
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show More