The piled raft is a geotechnical composite construction consisting of three elements: piles, raft and soil.
In the design of piled rafts, the load shared between the piles and the raft, and the piles are used up to a
load level that can be of the same order of magnitude as the bearing capacity of a comparable single
pile or even greater. Therefore, the piled raft foundation allows reduction of settlements in a very
economic way as compared to traditional foundation concepts.
This paper presents experimental study to investigate the behavior of piled raft system in sandy
soil. A small scale “prototype” model was tested in a sand box with load applied to the system through
a compression machine. The settlement was measured at the center of the raft, strain gages were used
to measure the strains and calculate the total load carried by piles. Four configurations of piles (2x1,
3x1, 2x2 and 3x2) were tested in the laboratory, in addition to rafts with different sizes. The effects of
pile length, pile diameter, and raft thickness on the load carrying capacity of the piled raft system are
included in the load-settlement presentation.
It was found that the percentage of the load carried by piles to the total applied load of the
groups (2x1, 3x1, 2x2, 3x2) with raft thickness of 5 mm, pile diameter of 9 mm, and pile length of 200
mm was 28% , 38% , 56% , 79% , respectively. The percent of the load carried by piles increases with
the increase of number of piles.
Abstract:
The Iraqi economy faces complex economic challenges that threaten the prospects for growth and stability in the short and medium term, The decrease in oil revenues on which Iraq is based in financing its total expenditure, both operational and investment, led to the emergence of a deficit in the government budget, As the global oil price crisis affected the revenues of the Iraqi government negatively, especially as this negative impact coincided with the increase in military spending resulting from Iraq's war against terrorism, Which led to the Iraqi government to implement austerity measures were to reduce public spending on several projects, which are less important compared to projects that a
... Show MoreA simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μ
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreThis work involves the calculation of the cooling load in Iraqi building constructions taking in account the effect of the convective heat transfer inside the buildings. ASHRAE assumptions are compared with the Fisher and Pedersen model of estimation of internal convective heat transfer coefficient when the high rate of ventilation from ceiling inlet configuration is used. Theoretical calculation of cooling load using the Radiant Time Series Method (RTSM) is implemented on the actual tested spaces. Also the theoretical calculated cooling loads are experimentally compared by measuring the cooling load in these tested spaces. The comparison appears that using the modified Fisher and Pedersen model when large ventilation ra
... Show MoreMost recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show MoreGlobalization as phenomena has affected all aspects of life and reflected its impacts to the Arab world politically, economically, and culturally and became a vital field that related directly to our life. This field of searching needs as many studies and Academics as for employing the means that needed to face a national challenge which targeting the Arabic man Character in its ethics and values. This very important thing needs a very important reaction to face that challenge to protect the cultural ARABIC & ISLAMIC characteristics and to take care of education in all its levels and forms as it is an invincible fort. For that, this field has become as the priority of the studying and researches if the
... Show MoreMobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreAn intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show More