The tunnel’s stability during construction is a very important matter. Some methods have been proposed for stability evaluation, but the hazard warning levels (HWLs) are more applicable among these methods. Despite monitoring and applying HWLs, several collapses in Shibli twin tunnels in Iran have cast doubts on the accuracy of this criterion in the presence of water. In this study, the critical strains under different water contents were measured through uniaxial compressive strength tests on 11 different shale and marl samples. A comparison of laboratory tests and numerical results shows that the influence of the moisture content on the critical strain is negligible. In addition, the results show that there is no direct relationship between the critical strain and uniaxial compression strength.
This work investigates experimentally the effect of using a skirt with a square foundation of 100 mm width resting on dry gypseous soil (i.e., loose soil with 33% relative density), and subjected to an inclined load. Previous works did not study the use square skirted foundation rested on gypseous soil and subjected to inclined load. The investigated soil was brought from Tikrit city with 59% gypsum content. Standard physical and chemical tests on selected soil were carried out. Model laboratory tests were carried out to determine the effect of using a skirt with a square foundation on the load-settlement behavior of gypseous soil and subjected to inclined load with various Skirt depth (Ds) to foundation width (B) ratio
... Show MoreThe other day in the Holy Quran and the four Gospels
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreNominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak
Succinic acid is an essential base ingredient for manufacturing various industrial chemicals. Succinic acid has been acknowledged as one of the most significant bio based building block chemicals. Rapid demand for succinic acid has been noticed in the last 10 years. The production methods and mechanisms developed. Hence, these techniques and operations need to be revised. Recently, an omnibus rule for developing succinic acid is to find renewable carbohydrate Feedstocks. The sustainability of the resource is crucial to disintegrate the massive use of petroleum based-production. Accordingly, systematically reviewing the latest findings of bacterial production and related fermentation methods is critical. Therefore, this paper aims to stud
... Show MoreThe current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show MoreA simulation study is used to examine the robustness of some estimators on a multiple linear regression model with problems of multicollinearity and non-normal errors, the Ordinary least Squares (LS) ,Ridge Regression, Ridge Least Absolute Value (RLAV), Weighted Ridge (WRID), MM and a robust ridge regression estimator MM estimator, which denoted as RMM this is the modification of the Ridge regression by incorporating robust MM estimator . finialy, we show that RMM is the best among the other estimators
Background: Toll-like receptors (TLRs) play a significant role in the activation of adaptive immunity and may have an essential role in the development of rheumatoid arthritis (RA). Objectives: To assess the gene expression of TLR4 in individuals with RA compared to healthy individuals. Methods: From July to December 2022. A total of 100 individuals were encompassed in the study, consisting of 50 individuals diagnosed with RA, of whom 42 were females and 8 were males, with an average age of 45.22 years. Additionally, there were 50 healthy control participants, 40 of whom were females and 10 were males, with an average age of 45.64 years. To assess the TLR4 transcript levels, blood samples were collected from each participant, and RN
... Show MoreChapter-1
Problem of the research:
The studies and researches have noticed the aggravation of violence practice in all educational means using different and innovated styles against children in the school and house in order to upbringing by the parents or the school .
It is a training method for the person to participate in the society and prepare him to be an effective member.
The current research confines the children in age (6-12) years old representing the primary stage who face different kind of violence during the familiar or school education.
The current research aims to:
1 – The kinds of violence which happens to the children in the primary
... Show MoreThis study sought to give a general picture of the organizations and formations of the ground forces of the Abbasid army in its first era, in preparation and armament and continuous development of the mechanisms to help maintain the moral and spiritual morale in the fighting.
Therefore, the caliphs' interest in building the army, organizing it, arming it, choosing competent leaders, and providing them with various weapons in terms of production and storage, as well as taking care of fortifying the cities and gaps in determination and determination, and embarked on construction and restoration, where amazing speed and acted according to the circumstances. During the first Abbasid era, there were significant developments in the military