Preferred Language
Articles
/
joe-2255
Effect of Swelling Soil on Load Carrying Capacity of a Single Pile
...Show More Authors

Expansive soils are recognized by their swelling potential upon wetting due to the existence of some clay minerals such as  montmorillonite. An effective solution was found to avoid the danger of such soils by using piles. A single pile embedded in an elasto-plastic expansive soil has been analyzed by using one of the available software which is ABAQUS to investigate the effect of applied loads on pile’s top and investigate the effect of swelling soils on load carrying capacity of the pile. The result shows that as the pile is axially loaded at its top, the axial force along the pile gradually changes from (tension) to (compression) and the pile tends to move downward. The applied load needed to initiate pile’s settlement depends on pile’s embedment depth and the depth of active zone. The ultimate carrying capacity of a single pile for no swelling conditions is greater than that of with swelling conditions.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 02 2013
Journal Name
Iraqi Medical Journal
Etiology and Antibiotic Sensitivity for Otitis Media in A Central Pediatric Teaching Hospital.
...Show More Authors

Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Planner And Development
Urban sustainability assessment for the urban renewal project in Al Shawaka a rea
...Show More Authors

Sustainability is a major demand and need pursued by cities in all areas of life due to the environmental, social and economic gains they provide, especially in the field of city planning and urban renewal projects that aim to integrate the past, present and future.

 

The research aims to evaluate the Haifa Street renewal project, and Al-Shawaka district, one of the Baghdad districts located next to Al-Karkh, was elected by comparing the sustainability indicators of urban renewal with the reality of the situation through a field survey and questionnaire form and focusing on the social and economic impacts and environmental for the project on the study area. To reach the most important conclusions and recommendations

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Euphrates Journal Of Agricultural Science
A field compare five horticulture machines when used normal and super Iraqi fuel
...Show More Authors

A field Experiment was carried out in Baghdad for the purpose of compare five horticulture machines during used two types of fuel deffirance in octane number, normal and super fuel which produced in Iraqi and measuring the vibrations transmitted of the three axes are longitudinal X , lateral Y and vertical Z from handlebar in (Mowers) to the operator which walks behind the mower, and the determine of the productivity practical of cutting, productivity passing and fuel consumption. Experiment Factorial used with two factors, The first factor was Five Mowers vary in width , types, weight and company manufacturer, The Second factor was the types of fuel used internal combination engine horticulture mowers were Normal fuel with Octane Number 82

... Show More
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Language formats in contemporary Arabic poetry in Iraq Areading from a functional perspective
...Show More Authors

Numerous academic and critical studies concerned with the language of poetry, with the differences and diversity in these studies and the critical methods. , the study tries to study this modern approach in the language Iraqi and Arabic poetry according to analyzing and following the functional dimension of the language, regardless of its poetic value which should be on them, as each poetic experience has its own language, thestudy came to investigate the variety of poetry samples, poets from different and far generations. - in an attempt to give an image Career dimension of language, the center of intellectual transformations that have affected the experience of Arabic poetry generally, and the level of language to be exact, as a tool f

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Topology-Based Modularity and Modularity Density for Detecting Protein Complexes: A Comparative Study
...Show More Authors

     Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin

... Show More
View Publication
Scopus Crossref