Existence of these soils, sometimes with high gypsum content, caused difficult problems to the buildings and strategic projects due to dissolution and leaching of gypsum by the action of waterflow through soil mass. In this research, a new technique is adopted to investigate the performance of replacement and geosynthetic reinforcement materials to improve the gypseous soil behavior through experimential set up manufactured loaclally specially for this work. A series of tests were carried out using steel container (600*600*500) mm. A square footing (100*100) mm was placed at the center of the top surface of the bed soil. The results showed that the most effective thickness for the dune sand layer with geotextile at the interface, within the tested range, was found to be almost equal to the width of foundation. Therefore, under this depth, the soil was reinforced with geogrid
and geotextile. It can be shown that (Collapse Settlement Reduction Factor) increases to (72%) when using two layers of geogrid and one layer of geotextile under depth of replacement equal to the width of footing. In addition, the results showed that the bearing capacity increases to (1.5-2.0) time under concentric loads and (2.5-3) under eccentric loads after replacement and reinforcement of gypseous soil
Understanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.
In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.
RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show MoreCybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreAbstract
In order to determine what type of photovoltaic solar module could best be used in a thermoelectric photovoltaic power generation. Changing in powers due to higher temperatures (25oC, 35oC, and 45oC) have been done for three types of solar modules: monocrystalline , polycrystalline, and copper indium gallium (di) selenide (CIGS). The Prova 200 solar panel analyzer is used for the professional testing of three solar modules at different ambient temperatures; 25oC, 35oC, and 45oC and solar radiation range 100-1000 W/m2. Copper indium gallium (di) selenide module has the lowest power drop (with the average percent
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor
... Show More