Preferred Language
Articles
/
alkej-226
Profiles and Geotechnical Properties for some Basra Soils
...Show More Authors

 Abstract

Basra province is known for its logistic location for trading activity and oil industry. By geological point of view, Basra areas are believed to consist mainly of alternation of (clay, silty clay, clayey silt, silt and sand) type of soil. Any development of industry in this area should be affected by the occurrence of the clay soil. That is why the investigation to the soil is more than necessary. In this case, a vast testing program was carried out by the author to evaluate the various formations constituting the of some Basra soils. An attempt to characterize and discuss the nature, minerals, engineering behavior and field properties of soil samples extracted from more than one thousand and one hundred boring liner meters of three sites was performed. The average values of various geotechnical design properties are calculated and plotted with depth. A preview of climate, geology, seismicity and earthquakes of the study area was conducted. Finally, the typical soil profiles were prepared.

Keywords: Basra soil, soft clay, lean clay, Atterberg limits, moisture content, shear strength, standard penetration,

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 08 2023
Journal Name
Journal Of Planner And Development
Lebanese building law between texts, Application gaps and land scarcity
...Show More Authors

This paper examines the gaps in Lebanese building law as well as the exploitation of contractors, stakeholders, and residents in order to make illegal profits at the expense of The Shape of urban agglomerations and their expansion in cities and rural areas, which is contrary to the principles of sustainable land development. It also emphasizes the amplification of the factors of vertical and horizontal building investments in the implementation of buildings contrary to the license, as well as the burden that this places on the city's resulting infrastructure and ability to absorb the activities and needs of its residents. The study then presents recommendations in the process of transformation in the technique of planning and application

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The Idea of Water, Between Mythological Literature, And Mesopotamian Sculpture
...Show More Authors

 Water represents as a basic intellectual material in the myths of creation and the start of formation, Thus, water has turned into an intellectual material in literary mythological texts in addition to its function in sculptural Mesopotamian sculpture. The research is in three sections: the first section deals with Myth, its concept, peculiarities and types, the second section is about mythological literature, the third section is about the idea of ​​water and mythical literature. The question research question here is that does the idea of water have any impact on mythological literature? And Does it link to sculptural products? The importance of the research is that it shows the human imagination and its relationship to functioni

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
The Kinetic responses and foraging behavior of Drosophila melanogaster larvae
...Show More Authors

Adaptive responses in larval behavior may be of two kinds: Taxis: This involves a change in direction relative to source of a stimulus. Kinesis: Kinesis has no directional component, but involves change in the rate of performance in response to a stimulus. Drosophila larvae exhibited flexible behavioral responses associated with food acquisition and selection for different environmental conditions. In this investigation, we are concerned explosively with kinetic responses to food viability. Third instar larvae were subjected to test for thirty minutes in each of the following conditions i) in distilled water, ii) in Ringer's solution, iii) in glucose solution and on live yeast suspension. In each case the larva was in a thin layer of solu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Effects of lead and Zenic on Scenedesmus quadricaudaVar. longispina algae
...Show More Authors

The study includs,effect of concentration of Lead 0.2 ,0.3 , 0.5, 5 , 10 mg/L and Zinc 0.1,0.5 , 2 , 4 , 8 mg/L lonely or to gether on growth green algae( Scenedesmus quadricauda var . longispina) according to the total qauntity for the cells and the adsorption of the algae to the zn,pb concentration .growth curve and dubbling time growth were calculated with or without there heavy metals . Results shows that there are significant differences (P<0.01) for growth curve and the control. (7.5201 cell /h)and with dubbling times (9.87 cell/h). The heavy metals(Pb, Zn). shows antagonistic effect when both used in media.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Response of Local rice cultivar to Zinc and Boron application
...Show More Authors

Five levels of Zn-EDTA fertilizer and foliar application of boron were used to study the local rice response through studying of some vegetative and reproductive growth characters, by conducting two field experiments at Kanipanka Agricultural Research Station during the summer season of 2004 by using RCBD with three replications. Significant differences were found in studied characters, there were increase in the number of days from seeding to 50% flowering (94.330-96.233) days, from 50% flowering to physiological maturity (37.50-38.28) days, plant height (82.50-91.423) cm and LAI (5.441-7.525). Reproductive characters such as number of grains panicle-1 (74.11-85.88), number of panicles m-2 (321.00-426.083), biological yield (8166.166-11082

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 10 2025
Journal Name
Al–bahith Al–a'alami
Radio Republic of Iraq and Awareness Promoting of Minorities’ Rights
...Show More Authors

Proposals to raise awareness of the rights of minorities and secure their freedoms have begun to receive attention Internationally. It is escalated, especially after the increasing impact of wars and conflicts on these situations Minorities, and UNESCO stresses the need to take over information and communication policies Greater attention to protect minority rights.

Hence the importance of our research, the problem of which lies in the main question: (What is the role Radio Republic of Iraq has played in promoting awareness of minority rights at the level : Public and  Social?) . As one of the Iraqi media networks , laws oblige them to pay attention to the rights of minorities and to spread a culture of pluralism , diversity

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Engineering
Assessing of the Morphology and Sediment Transport of Diyala River
...Show More Authors

 

Diyala River is one of the important rivers that provide water for the Governorate of Diyala. In this research, the morphology and sediment transport of this river were studied using HEC-Ras software. The selected length of the river in the present study is 193 km and extended from Diyala Weir to the confluence of Tigris River and Diyala River. The fieldwork period extended from June 2020 till August 2020, where suspended-load and bed-load samples were collected and surveyed some cross-sections. The one-dimensional sediment transport model has been calibrated for five years, from 2014 to 2019. The results were compared with the measured cross-sections in 2019,  and the suitable value of (maximum depth

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Digital Image Watermarking Using Arnold Scrambling and Berkeley Wavelet Transform
...Show More Authors

Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.

View Publication Preview PDF