Preferred Language
Articles
/
joe-2103
Experimental and Numerical Analysis of Piled Raft Foundation with Different Length of Piles Under Static Loads
...Show More Authors

In order to understand the effect of (length of pile / diameter of pile) ratio on the load carrying capacity and settlement reduction behavior of piled raft resting on loose sand, laboratory model tests were conducted on small-scale models. The parameters studied were the effect of pile length and the number of piles. The load settlement behavior obtained from the tests has been validated by using 3-D finite element in ABAQUS program, was adopted to understand the load carrying response of piled raft and settlement reduction. The results of experimental work show that the increase in (Lp/dp) ratio led to increase in load carrying capacity by piled raft from (19.75 to 29.35%), (14.18 to 28.87%) and (0 to 16.49%) , the maximum load carried by piles decrease from(9.1 to 22.72%), (15.79 to 47.37%) and (44 to 81.05%) and the response of settlement piled raftdecrease from (16.67 to 23.33%), (9.09 to 39.39%) and (30%) with increase the number of piles from 4 to (6 and 9) and (length of pile / diameter of pile) ratio increase to (14.14 and 21.2), respectively. The numerical and model test results are found to be in a good agreement.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Corrosion Inhibition of Carbon Steel under Two Phase Flow (Water-Petroleum) Simulated by Turbulently Agitated System
...Show More Authors

The corrosion of carbon steel in single phase (water with 0.1N NaCl ) and two immiscible phases (kerosene-water) using turbulently agitated system is investigated. The experiments are carried out for Reynolds number (Re) range of 38000 to 95000 corresponding  to rotational velocities from 600 to 1400 rpm using circular disk turbine agitator at 40 0C. In two-phase system test runs are carried out in aqueous phase (water) concentrations of 1 % vol., 5 % vol., 8% vol., and 16% vol. mixed with kerosene at various Re. The effect of Reynolds number (Re), percent of dispersed phase, dispersed drops diameter, and number of drops per unit volume on the corrosion rate is investigated and discussed. Test runs are carried out using two types of

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
CATHODIC PROTECTION OF CARBON STEEL IN 0.1N NaCl SOLUTION UNDER FLOW CONDITIONS USING ROTATING CYLINDER ELECTRODE
...Show More Authors

The effect of applied current on protection of carbon steel in 0.1N NaCl solution (pH=7) was investigated under flow conditions (0-0.262 m/s) for a range of temperatures (35-55°C) using rotating cylinder electrode. Various values of currents were applied to protect steel from corrosion, these were Iapp.=Icorr., Iapp.=2Icorr. and Iapp.=2.4Icorr. under stationary and flow conditions. Corrosion current was measured by weight loss method. The variation of protection potential with time and rotation velocity at various applied currents was assessed. It is found that the corrosion rate of carbon steel increases with rotation velocity and
has unstable trend with temperature. The protection current required varies with temperature and it inc

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
discriminate analysis and logistic regression by use partial least square
...Show More Authors

Abstract

   The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.

In this, search th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 10 2025
Journal Name
Journal Of Visualized Experiments
Explainable AI for Visual Inspection: A Comparative Analysis and Review
...Show More Authors

Explainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 26 2017
Journal Name
Separation Science And Technology
Schiff bases and their complexes: Recent progress in thermal analysis
...Show More Authors

Schiff bases are versatile compounds synthesized from the condensation of primary amino compounds with aldehydes or ketones. The high thermal of many Schiff base and their complexes were useful attributes for their application as catalysts in reactions involving at high temperatures. This thermal behavior of Schiff bases and their complexes was evaluated by TGA/DTG and DTA curves with 10 mass losses related to dehydration and decomposition. This review summarizes the developments in the last decade for thermal analysis of Schiff bases. Therefore, synthesis of Schiff bases and their complexes are reviewe

View Publication Preview PDF
Scopus (67)
Crossref (56)
Scopus Clarivate Crossref
Publication Date
Tue Mar 20 2018
Journal Name
Day 3 Thu, March 22, 2018
Southern Iraqi Oil Fields Drilling Problems Identification, Analysis, and Treatment
...Show More Authors
Abstract<p>Multiple drilling problems are being faced continuously while drilling wells in the southern Iraqi oil fields. Many of which are handled poorly and inefficiently which yields longer non-productive time due to the lack of knowledge about the source of these problems. This study aims to investigate the Basra oil fields formations from Faris to Mishrif, diagnose the potential problems, and present the optimum treatment for each problem.</p><p>Gathering of field data and previous studies on the subject, in addition to the field experience of drilling supervisors were all the information bases of this study. Southern Iraqi oil fields were studied and analyzed care</p> ... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Russian politics and geographical variable fixed in under the geostrategic changes (A study in the geo-political perspective and geopolitics)
...Show More Authors

The purpose of this study is to show the constants and variables geography in Russian
policy in light of variables geostrategic witnessed by the world, especially after the collapse
of the Soviet Union and the disintegration to fifteen Republic became the Russian Federation
and the heir to the Soviet Union, Geography particularly important because the impact of its
data in policy making less change ofothers, and explain the political choices cannot achieve
security through its relationship constants geographical (natural or human) paint forms of
economic activity and determine the points they national security. issue is the geographical
this or that country is determined by its policy also specifies the way in which

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors