Preferred Language
Articles
/
joe-215
Field Observation of Soil Displacements Resulting Due Unsupported Excavation and Its Effects on Proposed Adjacent Piles
...Show More Authors

Soil movement resulting due unsupported excavation nearby axially loaded piles imposes significant structural troubles on geotechnical engineers especially for piles that are not designed to account for loss of lateral confinement. In this study the field excavation works of 7.0 m deep open tunnel was continuously followed up by the authors. The work is related to the project of developing the Army canal in the east of Baghdad city in Iraq. A number of selected points around the field excavation are installed on the ground surface at different horizontal distance. The elevation and coordinates of points are recorded during 23 days with excavation progress period. The field excavation process was numerically simulated by using the finite element package PLAXIS 3D foundation. The obtained analysis results regarding the displacements of the selected points are compared with the field observation for verification purpose. Moreover, finite element analysis of axially loaded piles that are presumed to be existed at the locations of the observation points is carried out to study the effect of excavation on full scale piles behaviors. The field observation monitored an upward movement and positive lateral ground movement for shallow excavation depth. Later on and as the excavation process went deeper, a downward movement and negative lateral ground movement are noticed. The analyses results are in general well agreed with the monitored values of soil displacements at the selected points. It is found also that there are obvious effects of the nearby excavation on the presumed piles in terms of displacements and bending moments.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Temperature Effect on Photovoltaic Modules Power Drop
...Show More Authors

 Abstract

In order to determine what type of photovoltaic solar module could best be used in a thermoelectric photovoltaic power generation. Changing in powers due to higher temperatures (25oC, 35oC, and 45oC) have been done for three types of solar modules: monocrystalline , polycrystalline, and copper indium gallium (di) selenide (CIGS). The Prova 200 solar panel analyzer is used for the professional testing of three solar modules at different ambient temperatures; 25oC, 35oC, and 45oC and solar radiation range 100-1000 W/m2. Copper indium gallium (di) selenide module   has the lowest power drop (with the average percent

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Shot boundary detection based on orthogonal polynomial
...Show More Authors

View Publication
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Annealing Effect on the phase Transformation in
...Show More Authors

This work describes the effect of temperature on the phase transformation of titanium dioxide (TiO2) prepared using metal organic precursors as starting materials. X-ray diffraction (XRD) was used to investigate the structural properties of TiO2 gels calcined at different temperatures (300, 500, 700) ?C. the results showed that the samples have typical peaks of TiO2 polycrystalline brookite nanopowders after calcined at (300 ?C), which confirmed by (111), (121), (200), (012), (131), (220), (040), (231), (132) and (232) diffraction peaks. Also, XRD diffraction spectra showed the presence of crystallites of anatase with low proportion of rutile phase where calcined at (500 ?C), while rutile phase domains at (700 ?C). The crystallite size of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Agricultural And Statistical Sciences
ON ERROR DISTRIBUTION WITH SINGLE INDEX MODEL
...Show More Authors

In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.

Scopus
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More