Preferred Language
Articles
/
joe-2253
Improvement of Soil by Using Polymer Fiber Materials Underneath Square Footing
...Show More Authors

The change in project cost, or cost growth, occurs from many factors, some of which are related to soil problem conditions that may occurs during construction and/or during site investigation period. This paper described a new soil improvement method with a minimum cost solution by using polymer fiber materials having a length of (3 cm) in both directions and (2.5 mm) in thickness, distributed in uniform medium dense .
sandy soil at different depths (B, 1.5B and 2B) below the footings. Three square footings has been used (5,7.5 and 10 cm) to carry the above investigation by using lever arm loading system design for such purposes.
These fibers were distributed from depth of (0.1B) below the footing base down to the investigated depth. It was found that the initial vertical settlement of footing was highly affected in the early stage of loading due to complex Soil-Fiber Mixture (SFM) below the footing. The failure load value for proposed model in any case of loading increased compared with the un-reinforced soil by increasing the depth of improving below the footing. The Bearing Capacity Ratio (BCR) for soil-fiber mixture has been increased by ratio of (1.4 to
2.5), (1.7 to 4.9), and (1.8 to 8) for footings (5, 7.5, and 10 cm) respectively. The yield load-settlement for soil-fiber mixture system started at settlement of about 1.1% B while the yield load in un-reinforced soil started at smaller percentage which reflects the benefits of using such fiber materialfor improving soil behavior. Comparison between experimental and predicted (calculated) settlement below the footings showed the difference in ranges were within accepted limits for foundation settlements design

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
Using Online Platforms to Improve Writing
...Show More Authors

Due to the difficulties that Iraqi students face when writing in the English language, this preliminary study aimed to improve students' writing skills by using online platforms remotely. Sixty first-year students from Al-Furat Al–Awsat Technical University participated in this study. Through these platforms, the researchers relied on stimuli, such as images, icons, and short titles to allow for deeper and more accurate participations. Data were collected through corrections, observations, and feedback from the researchers and peers. In addition, two pre and post-tests were conducted. The quantitative data were analysed by SPSS statistical Editor, whereas the qualitative data were analyzed using the Piot table, an Excel sheet. The resu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ssrn Electronic Journal
Human Mobility Patterns Modelling Using Cdrs
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Using LiF Disc in Thermoluminescence Dosimetry
...Show More Authors

A LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.

View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Attacking Jacobian Problem Using Resultant Theory
...Show More Authors

     This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type:  ,            and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Feb 04 2015
Journal Name
The Second Biological Science Conference
Bioethanol Production Using Date Syrup Wastes
...Show More Authors