Preferred Language
Articles
/
joe-2885
ANALYSIS OF GEOTEXTILE EMBANKMENT BY ANSYS
...Show More Authors

The major objectives of this research are to analyze the behavior of road embankments
reinforced with geotextiles constructed on soft soil and describe the finite element analysis by using
ANSYS program ver. (5.4). The ANSYS finite element program helps in analyzing the stability of
geo- structure (embankment) in varied application of geotextiles reinforcement to enhance the best
design for embankment.
The results of analysis indicate that one of the primary function of geotextiles reinforcement was to
reduce the horizontal displacement significantly. With the inclusions of reinforcement, the horizontal
displacement reduced by about (81%), while the vertical displacement reduced by (32%). The effect
of geotextiles stiffness modulus on horizontal and displacement is quite significant even a very high
modulus of geotextile will have relatively little effect on vertical displacement. Also it is observed
from the obtained results that the maximum displacement occurred at the toe of embankment for both
horizontal and vertical movement, then decrease gradually to a negligible value for the layer
reinforced case. Also the reinforcement reduces the shear stress developed in the foundation soil.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
Journal Of Language Studies
A Rhetorical Analysis of Fallacy in a Selected English Drama Movie
...Show More Authors

Fallacies are incorrect reasoning that make an argument seem less logically credible and easier to be identified as unsound. They are widespread; individuals commit them while engaging in various activities, including at work, at home, while creating advertisements, and in the media. This study aims to investigate the rhetorical strategies accompanied with producing the fallacious arguments selected from the American Film “12 Angry Men (1957)”. The study adopts Damer’s (2009) model for the identification of fallacy. As for rhetorical analysis, the study adopts Aristotle’s triangle of rhetoric and McGuigan’s (2007) taxonomy of rhetorical devices. The results uncover that the most violated criteria are relevance, acceptabili

... Show More
View Publication
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of The College Of Education For Women
A Stylistic Analysis of Two Selected Poems: تحليل اسلوبي لقصيدتين مختارتين
...Show More Authors

 

This paper presents a stylistic analysis of two poems of well-known poets of the English literature, namely; E.E. Cummings and the Irish noble laureate Seamus Heaney.  The researcher's attempt here is to approach Cummings’s poem “maggie and milly and molly and may” and Heaney’s “A Kite for Aibhín from the stylistics’ point of view.  The paper also analyzes the poems using the tools of linguistics with a view to make their meaning explicit.

          It is worth noting that stylistics as a scientific discipline is really beneficial to those who are teaching and studyi

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Comparative Analysis of Various Multicarrier Modulation Techniques for Different Multilevel Converters
...Show More Authors

The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jun 24 2023
Journal Name
Arab World English Journal
The Construction of Racism in Cartoon Films: A Critical Discourse Analysis
...Show More Authors

Animation is an industry that is expanding more quickly than ever. Every child’s favorite activity is watching cartoons. Therefore, it is essential to be cautious of the kinds of cartoon films children and teenagers tend. Because children and teenagers are the target audience for these films. This study aims at exposing a hidden enactment, namely racism, in a well-known cartoon film, Lion King, which has been selected accurately by the researchers because it shapes a set of ideas about black people and constructs prejudiced beliefs in their minds. This study is to answer the inquiry ‘Is the ideology of racism imposed in Lion King? And how?’ The significance of the present paper lies in highlighting the educational function of

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Numerical and Experimental Analysis of Aircraft Wing Subjected to Fatigue Loading
...Show More Authors

This study deals with the aircraft wing analysis (numerical and experimental) which subjected to fatigue loading in order to analyze the aircraft wing numerically by using ANSYS 15.0 software and experimentally by using loading programs which effect on fatigue test specimens at laboratory to estimate life of used metal (aluminum alloy 7075-T651) the wing metal and compare between numerical and experimental work, as well as to formulate an experimental mathematical model which may find safe estimate for metals and most common alloys that are used to build aircraft wing at certain conditions. In experimental work, a (34) specimen of (aluminum alloy 7075-T651) were tested using alternating bending fatigue machine rig. The t

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The Bifurcation Analysis of Food Web Prey- Predator Model with Toxin
...Show More Authors
Abstract<p>Local and global bifurcations of food web model consists of immature and mature preys, first predator, and second predator with the current of toxicity and harvesting was studied. It is shown that a trans-critical bifurcation occurs at the equilibrium point <italic>E</italic> <sub>0</sub>, and it revealed the existence of saddle-node bifurcation occurred at equilibrium points <italic>E</italic> <sub>1</sub>, <italic>E</italic> <sub>2</sub> and <italic>E</italic> <sub>3</sub>. At any point, the occurrence of bifurcation of the pitch for</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Tue May 11 2021
Journal Name
Egyptian Journal Of Medical Human Genetics
Molecular analysis of CFTR gene mutations among Iraqi cystic fibrosis patients
...Show More Authors
Abstract<sec> <title>Background

Cystic fibrosis (CF) is an autosomal recessive multisystem disease that results from mutation(s) of the cystic fibrosis transmembrane conductance regulator (CFTR) gene. More than 2100 mutations and polymorphisms have been reported in this gene so far. Incidence and genotyping of CF are under-identified in Iraq. This study aims to determine the types and frequencies of certain CFTR mutations among a sample of Iraqi CF patients. Two groups of patients were included: 31 clinically confirmed CF patients in addition to 47 clinically suspected patients of CF. All confirmed pa

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 17 2020
Journal Name
International Journal Of Applied Mechanics And Engineering
Analysis of structural concrete bar members based on secant stiffness methods
...Show More Authors

In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated

... Show More
Scopus
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (6)
Crossref