When embankment is constructed on very soft soil, special construction methods are adopted. One of the techniques is a piled embankment. Piled (stone columns) embankments provide an economic and effective solution to the problem of constructing embankments over soft soils. This method can reduce settlements, construction time and cost. Stone columns provide an effective improvement method for soft soils under light structures such as rail or road embankments. The present work investigates the behavior of the embankment models resting on soft soil reinforced with stone columns. Model tests were performed with different spacing distances between stone columns and two lengths to diameter ratios of the stone columns, in addition to different embankment heights. A total number of 21 model tests were carried out on a soil with undrianed shear strength ≈ 10 kPa. The models consist of stone columns embankment at spacing to diameter ratio equal to 2.5, 3 and 4. Three embankment heights; 200 mm, 250 mm and 300 mm were conducted. Three earth pressure cells were used to measure directly the vertical effective stress on column at the top of the middle stone column under the center line of embankment and on the edge stone column for all models while the third cell was placed at the base of embankment between two columns to measure the vertical effective stress in reinforced soft soil directly. The embankment models constructed on soft clay treated with ordinary stone columns at spacing ratio equal 2.5 revealed maximum bearing improvement ratio equals (1.21, 1.44 and 1.7) for 200 mm, 250 mm and 300 embankment heights, respectively and maximum settlement improvement ratio equals (0.78, 0.67 and 0.56) for 200 mm, 250 mm and 300 embankment heights, respectively.
In this paper ,we introduce hollow modules with respect to an arbitrary submodule .Let M be a non-zero module and T be a submodule of M .We say that M is aT-hollow module if every proper submodule K of M such that T ⊈ K is a T-small submodule of M .We investigate the basic properties of a T-hollow module
Forty patients with acute lymphoblastic leukemia(ALL) were tested for the serum levels of total sialic acid(TSA) and the immunoglobulins before and after treatnemnt with six diffrent chemotherapy protocols while significantly
In this paper, a discrete SIS epidemic model with immigrant and treatment effects is proposed. Stability analysis of the endemic equilibria and disease-free is presented. Numerical simulations are conformed the theoretical results, and it is illustrated how the immigrants, as well as treatment effects, change current model behavior
Fundamentals Concept in Metorology an Introductory Survey - ISBNiraq.org
An Optimal Algorithm for HTML Page Building Process
The Iraqi outfit is characterized by special features and identity that are closely related to the traditions, customs, religious and social beliefs and other references of the Iraqi environment and its factors affecting the individual and society. Every place in Iraq has its own uniform, which differs in terms of its artistic, aesthetic and functional components from place to place.
The abaya, especially worn by women, is especially distinct in terms of the design of the uniform, the nature of the cloth made of it, as well as the color of the abaya, which is dominated by black in most designs. The Dar Al-Taros Center and Textile Research initiated the construction of theoretical and practical bases in the design of contemporary
... Show MoreStructural and optical properties were studied as a function of Nano membrane after prepared, for tests. Nano membrane was deposited by the spray coating method on substrates (glass) of thickness 100 mm. The X-ray diffraction spectra of (CNTs, WO3) were studied. AFM tests are good information about the roughness, It had been designed electrolysis cell and fuel cell. Studies have been performed on electrochemical parameters.
is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines
... Show MoreFor several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.