Existence of these soils, sometimes with high gypsum content, caused difficult problems to the buildings and strategic projects due to dissolution and leaching of gypsum by the action of waterflow through soil mass. In this research, a new technique is adopted to investigate the performance of replacement and geosynthetic reinforcement materials to improve the gypseous soil behavior through experimential set up manufactured loaclally specially for this work. A series of tests were carried out using steel container (600*600*500) mm. A square footing (100*100) mm was placed at the center of the top surface of the bed soil. The results showed that the most effective thickness for the dune sand layer with geotextile at the interface, within the tested range, was found to be almost equal to the width of foundation. Therefore, under this depth, the soil was reinforced with geogrid
and geotextile. It can be shown that (Collapse Settlement Reduction Factor) increases to (72%) when using two layers of geogrid and one layer of geotextile under depth of replacement equal to the width of footing. In addition, the results showed that the bearing capacity increases to (1.5-2.0) time under concentric loads and (2.5-3) under eccentric loads after replacement and reinforcement of gypseous soil
A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
Estimations of average crash density as a function of traffic elements and characteristics can be used for making good decisions relating to planning, designing, operating, and maintaining roadway networks. This study describes the relationships between total, collision, turnover, and runover accident densities with factors such as hourly traffic flow and average spot speed on multilane rural highways in Iraq. The study is based on data collected from two sources: police stations and traffic surveys. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. The se
... Show MoreNecessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.
The study was conducted from November 2021 to May 2022 at the three study sites within the Baghdad governorate. The study aims to identify the impact of human activities on the Tigris River, so an area free of human activities was chosen and represented the first site. A total of 48 types were diagnosed, 6204 ind/m3 spread over three sites. The following environmental indicators were evaluated: Constancy Index (S), Relative abundance index (Ra), Richness Index (between 17.995 and 23.251), Shannon Weiner Index (0.48-1.25 bit/ind.), Uniformity Index (0.124 -0.323). The study showed that the highest percentage recorded was for the phylum Annileda 34%; and the stability index shows that taxes (Stylaria sp., Aoelosoma sp., Branchinra sowerby, Ch
... Show MoreFar infrared photoconductive detectors based on multi-wall carbon nanotubes (MWCNTs) were fabricated and their characteristics were tested. MWCNTs films deposited on porous silicon (PSi) nanosurface by dip and drop coating techniques. Two types of deposited methods were used; dip coating sand drop –by-drop methods. As well as two types of detector were fabricated one with aluminum mask and the other without, and their figures of merits were studied. The detectors were illuminated by 2.2 and 2.5 Watt from CO2 of 10.6 m and tested. The surface morphology for the films is studied using AFM and SEM micrographs. The films show homogeneous distributed for CNTs on the PSi layer. The root mean square (r.m.s.) of the films surface roughness in
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More