Preferred Language
Articles
/
joe-1645
Evaluation of Seepage Force and Overall Stability Factor Along Proposed Baghdad Metro Tunnel Across Tigris River
...Show More Authors

Baghdad Metro is a vital project to fulfill the rapidly increased traffic volume requirements. The proposed metro will connect both sides of Baghdad City, passing under the Tigris River. This study is employed finite elements software (PLAXIS 3D) to evaluate the seepage force developed around the sub-river segment during different construction stages and for other water levels of Tigris. The study found that when the water level changes from maximum to minimum, the developed seepage force decreases by (8 to 13%) and (22 to 27%) respectively. The seepage forces were found to be maximum during the excavation stage. The concrete lining process led to a noticeable reduction in seepage forces at all locations. The study also implemented the strength reduction theory to assess the overall stability of the tunnel. The study shows that the overall stability factor was minimum during the concrete lining process. As the water level decreased, the overall stability factor increased by (5% - 8%). 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Proposed Algorithm for Gumbel Distribution Estimation
...Show More Authors

Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu

... Show More
Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 03 2013
Journal Name
Journal Of Earth Sciences And Geotechnical Engineering
Time Domain of Piles Force and Deflection History of Piled Raft System under Axial Repeated Impact Load
...Show More Authors

In order to understand the effect of the number of piles (N), the history response of dynamic pile load in piled raft system and deflection time history of piled raft under repeated impact load applied on the center of piled raft resting on loose sand, laboratory model tests were conducted on small-scale models. The results of experimental work are found to be dynamic load increase with increase height of drop, the measured repeated dynamic load time history on the center of piled raft was close approximately to three a half sine wave shape with small duration in about (0.015 Sec). The maximum peak of impact loads occurs in pile and deflection time history occur after at the time of the peak repeated impact loads, dynamic pile load

... Show More
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Check List of the algae in Diyala River, Iraq
...Show More Authors

A total of 722 algal taxa are recorded in Diyala River by different authors. Most of the identification algae belong to three Divisions: Bacillariophyceae (367, 50.8%), Chlorophyceae (179, 24.8%), and Cyanophyceae (126, 17.5%).

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
Stability and bifurcation of a prey-predator system incorporating fear and refuge
...Show More Authors

It is proposed and studied a prey-predator system with a Holling type II functional response that merges predation fear with a predator-dependent prey's refuge. Understanding the impact of fear and refuge on the system's dynamic behavior is one of the objectives. All conceivable steady-states are investigated for their stability. The persistence condition of the system has been established. Local bifurcation analysis is performed in the Sotomayor sense. Extensive numerical simulation with varied parameters was used to explore the system's global dynamics. A limit cycle and a point attractor are the two types of attractors in the system. It's also interesting to note that the system exhibits bi-stability between these 2 types of attractors.

... Show More
View Publication Preview PDF
Scopus (12)
Scopus Clarivate Crossref
Publication Date
Fri Feb 18 2022
Journal Name
Journal Of Blood Medicine
Circulating miR-126-3p and miR-423-5p Expression in de novo Adult Acute Myeloid Leukemia: Correlations with Response to Induction Therapy and the 2-Year Overall Survival
...Show More Authors

Abstract Background: Acute myeloid leukemia (AML) results from sequential genetic alterations in a normal hematopoietic stem cell or its progenitors giving rise to an autonomous clone that dominates the bone marrow leading to marrow failure. MicroRNAs are short non-coding nucleic acid sequences that regulate post-transcriptional gene expression by base-pairing with their target mRNAs. MiRNAs can be secreted into extracellular fluids and carried to target cells by vesicles or bound to proteins. Intracellular and circulating miRNAs are believed to be useful markers in the diagnosis, prognosis, and treatment of various cancers. Practically, circulating miRNAs are more stable at room temperatures and extreme conditions. Purpose: This study aim

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
One and Two-Dimensional Hydraulic Simulation of a Reach in Al-Gharraf River
...Show More Authors

       

One and two-dimensional hydraulic models simulations are important to specify the hydraulic characteristics of unsteady flow in Al-Gharraf River in order to define the locations that facing problems and suggesting the necessary treatments. The reach in the present study is 58200m long and lies between Kut and Hai Cities. Both numerical models were simulated using HEC-RAS software, 5.0.4, with flow rates ranging from 100 to 350 m3/s. Multi-scenarios of gates openings of Hai Regulator were applied. While the openings of Al-Gharraf Head Regulator were ranged between 60cm to fully opened. The suitable manning roughness for the unsteady state was

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Zooplankton composition and structure in the Indus River Estuary, Sindh, Pakistan
...Show More Authors

In this study abundance and composition of zooplanktons in the Indus River Estuary was conducted to examine habitat characteristics and its impact on tiny organisms. Overall 30,656 individuals were identified and segregated into seven major groups including Copepods, Cnidarians, Decapods, Mollusk, Pisces, Amphipods and Chaetognaths. For better understanding they were further divided into eighteen planktonic categories. Among them Lucifer spp. comprises of 52.21% was the most abundant group with a peak appeared in March whereas Chaetognaths were rarely observed in the entire study period. Species diversity exhibited a mixed trend with the highest values (0.776) of dominance observed in spring (March). The results of Canonical Corresponden

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref