Preferred Language
Articles
/
joe-2972
EXPERIMENTAL OBSERVATIONS ON THE BEHAVIOR OF A PILED RAFT FOUNDATION
...Show More Authors

The piled raft is a geotechnical composite construction consisting of three elements: piles, raft and soil.
In the design of piled rafts, the load shared between the piles and the raft, and the piles are used up to a
load level that can be of the same order of magnitude as the bearing capacity of a comparable single
pile or even greater. Therefore, the piled raft foundation allows reduction of settlements in a very
economic way as compared to traditional foundation concepts.
This paper presents experimental study to investigate the behavior of piled raft system in sandy
soil. A small scale “prototype” model was tested in a sand box with load applied to the system through
a compression machine. The settlement was measured at the center of the raft, strain gages were used
to measure the strains and calculate the total load carried by piles. Four configurations of piles (2x1,
3x1, 2x2 and 3x2) were tested in the laboratory, in addition to rafts with different sizes. The effects of
pile length, pile diameter, and raft thickness on the load carrying capacity of the piled raft system are
included in the load-settlement presentation.
It was found that the percentage of the load carried by piles to the total applied load of the
groups (2x1, 3x1, 2x2, 3x2) with raft thickness of 5 mm, pile diameter of 9 mm, and pile length of 200
mm was 28% , 38% , 56% , 79% , respectively. The percent of the load carried by piles increases with
the increase of number of piles.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (239)
Crossref (183)
Scopus Clarivate Crossref
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Economics And Administrative Sciences
Leadership crisis and environmental pressures A Survey of the views of a sample of administrative leaders at Mosul University and the North technical University
...Show More Authors

The administrative leadership relies on a variety of behavioral paths in the functional areas in which it operates, and thus indicates its ability and thus has the upper hand in the organizational events, and in such a way that it can draw lessons and evaluate the results so as to test the expectations within the framework of the changes.

Does the study sample leadership have the characteristics that enable it to contain both crises and environmental stresses?

The aim of the study was to determine the location of the administrative leaders in the system of the study sample from the issue of crises and environmental pressures. The study concluded with a number of conclusions, the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Homomorphism of Cubic bipolar ideals of a KU-semigroup
...Show More Authors

The idea of a homomorphism of a cubic set of a KU-semigroup is studied and the concept of the product between two cubic sets is defined. And then, a new cubic bipolar fuzzy set in this structure is discussed, and some important results are achieved. Also, the product of cubic subsets is discussed and some theorems are proved.

Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
A THEORETICAL VISION OF THE METHODOLOGY OF MATCHING AND CONGRUENCE
...Show More Authors

Perhaps the issue of media and the press, especially one of the most common topics that people deliberate and deal with permanently and continuously. An issue of such significance has pushed researchers to put the following question, “Is it possible to live without media?”, “Can people ignore the newspaper, radio, TV, or the other communication means?”

The answer is very simple. It is difficult for civilized society to overtake information, or dispense with circulation, at the individual or collective level. Yet, the question of how to make the media and how it determines its content still requires extensive media experience; and knowledge of the social structure and its relations; and ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A Study of the Problems of Learning and Translating Idioms
...Show More Authors

Idioms are a very important part of the English language: you are told that if you want to go far (succeed) you should pull your socks up (make a serious effort to improve your behaviour, the quality of your work, etc.) and use your grey matter (brain).1 Learning and translating idioms have always been very difficult for foreign language learners. The present paper explores some of the reasons why English idiomatic expressions are difficult to learn and translate. It is not the aim of this paper to attempt a comprehensive survey of the vast amount of material that has appeared on idioms in Adams and Kuder (1984), Alexander (1984), Dixon (1983), Kirkpatrick (2001), Langlotz (2006), McCarthy and O'Dell (2002), and Wray (2002), among others

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Historical Value of Dickens’s A Tale of Two Cities
...Show More Authors

In "historical" fiction, characters that never really existed, give expression to the impact of historical events on the people who really did live through them. The result is not history, as an accurate record of actual events, but fiction in which an earlier age is rendered through the personal joys and sufferings of characters. This paper
aims at investigating the historical realities presented in Dickens’s A Tale of Two Cities.

View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Intellectual Capital and Role in Achieving of Management of Customer Experience : A field study of the views of a sample of the leaders of Iraqi banks
...Show More Authors

The issue of intellectual capital is a critical issue in the success and excellence of organizations, especially if it is linked to the management of customer experience, and because of the characteristic of the Iraqi environment, which affected all sectors, including the banking sector, it was important to discuss the types of intellectual capital and its relationship to the management of customer experience, especially when managers private banks, the importance of research lies in the linking of its variables to build the strategic capabilities of banks to achieve excellence and sustainability, it aims to diagnose the extent of interest in the types of intellectual capital and management of customer experience in the Iraqi ban

... Show More
View Publication Preview PDF
Crossref