Existence of these soils, sometimes with high gypsum content, caused difficult problems to the buildings and strategic projects due to dissolution and leaching of gypsum by the action of waterflow through soil mass. In this research, a new technique is adopted to investigate the performance of replacement and geosynthetic reinforcement materials to improve the gypseous soil behavior through experimential set up manufactured loaclally specially for this work. A series of tests were carried out using steel container (600*600*500) mm. A square footing (100*100) mm was placed at the center of the top surface of the bed soil. The results showed that the most effective thickness for the dune sand layer with geotextile at the interface, within the tested range, was found to be almost equal to the width of foundation. Therefore, under this depth, the soil was reinforced with geogrid
and geotextile. It can be shown that (Collapse Settlement Reduction Factor) increases to (72%) when using two layers of geogrid and one layer of geotextile under depth of replacement equal to the width of footing. In addition, the results showed that the bearing capacity increases to (1.5-2.0) time under concentric loads and (2.5-3) under eccentric loads after replacement and reinforcement of gypseous soil
For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreA disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach
Background: Sperm motility disorder is an important cause of infertility in male, and one of the causes of reduced motility of the sperm is the disorders of the mitochondria because it provides the required energy for sperm motility, Laser biostimulation or low-level laser therapy has a positive effect on the mitochondria and led to increasing the synthesis of ATP. Method: Twenty fresh human semen samples were used in this research study, each sample was separated into two portions, one was used as control which is not exposed to the laser beam and the other was irradiated with the wavelength of 410 nm diode laser with an output power of 100 mW and an exposure time of 60 seconds, then the measurement of
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More