The tunnel’s stability during construction is a very important matter. Some methods have been proposed for stability evaluation, but the hazard warning levels (HWLs) are more applicable among these methods. Despite monitoring and applying HWLs, several collapses in Shibli twin tunnels in Iran have cast doubts on the accuracy of this criterion in the presence of water. In this study, the critical strains under different water contents were measured through uniaxial compressive strength tests on 11 different shale and marl samples. A comparison of laboratory tests and numerical results shows that the influence of the moisture content on the critical strain is negligible. In addition, the results show that there is no direct relationship between the critical strain and uniaxial compression strength.
The aim of this work is to study the effect of diesel fuel percentage on the combustion processes in compression ignition engine using dual – fuel (diesel and LPG).
The brake thermal efficiency increased with the increase of diesel fuel rate at low loads, and decreased when load increased. To get sufficient operation in engine fueled with dual fuel, it required sufficient flow rate of diesel fuel, if the engine fueled with insufficient diesel fuel erratic operation with miss fire cycles presented.
Dual-fuel operation at part load showed higher specific fuel consumption than straight diesl operation. At full loads, brake specific fuel consumption of duel fuel engine approaches that for diesel fuel values.
The official spokesperson considered responsible for the transmission of information and communication messages that convey the government’s view on the various political and economic issues that affect the public opinion towards the performance achieved by the various governmental institutions and for the purpose of communicating with the media in a positive and effective manner, a number of institutions in the world in general and in Iraq in particular have nominated a spokesman to coordinate the efforts and the dissemination of news and the preparation of press conferences to contribute to the achievement of a positive and effective level between the government and the media, so this study has tackled to deal with the credibility of
... Show MoreCustomers' creditworthiness standards are the key means employed by private commercial banks in assigning a suitable credit assessment for each customer. Accordingly, it had an instrumental role in indicating the degree of solvency of the potential customer before granting the required credit. The research problem reveals the nature of the relationship between the criteria of customer’s creditworthiness and banking liquidity. The most critical objectives of the study shed light on the role of using creditworthiness criteria as a tool for credit analysis of customers by banks that help reducing credit risks and thus increase banking liquidity. The questionnaire that was distributed to bank employees, the research sample, which w
... Show MoreThe current research aims to know the extent of the impact of performance evaluation in its dimensions as an explanatory variable in the behavioural and attitudinal work outputs with its dimensions as a response variable in order to reach appropriate solutions through which the University of Fallujah seeks to achieve its goal in the process of diagnosing the axes of strength and to benefit from them in the process of strengthening the status and sobriety of the academic position of the professor and the researcher relied on The descriptive and analytical approach in carrying out this study, and data was collected from university professors, including leaders, heads of departments and divisions, who numbered (97) teachers. And fie
... Show MoreThe aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas
... Show MoreThe advent of UNHCR reports has given rise to the uniqueness of its distinctive way of image representation and using semiotic features. So, there are a lot of researches that have investigated UNHCR reports, but no research has examined images in UNHCR reports of displaced Iraqis from a multimodal discourse perspective. The present study suggests that the images are, like language, rich in many potential meanings and are governed by clearly visual grammar structures that can be employed to decode these multiple meanings. Seven images are examined in terms of their representational, interactional and compositional aspects. Depending on the results, this study concludes that the findings support the visual grammar theory and highlight the va
... Show MoreSoftware Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreLet R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative