Preferred Language
Articles
/
joe-373
Analytical Approach for Load Capacity of Large Diameter Bored Piles Using Field Data
...Show More Authors

An analytical approach based on field data was used to determine the strength capacity of large diameter bored type piles. Also the deformations and settlements were evaluated for both vertical and lateral loadings. The analytical predictions are compared to field data obtained from a proto-type test pile used at Tharthar –Tigris canal Bridge. They were found to be with acceptable agreement of 12% deviation.

               Following ASTM standards D1143M-07e1,2010, a test schedule of five loading cycles were proposed for vertical loads and series of cyclic loads to simulate horizontal loading .The load test results and analytical data of 1.95m in diameter test pile proved efficiently to carry a working load of 450 tons. The calculated lateral displacements based on a specified coefficient of subgrade reaction are compared to the measured values from dial gauges and strain gauges placed at various locations along the length of the pile.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluation of The Nuclear Data on(α,n)Reaction for Natural Molybdenum
...Show More Authors

The cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc.   We considered an energy range from threshold to 25 MeV in interval (1 MeV).   The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for eac

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimate Complete the Survival Function for Real Data of Lung Cancer Patients
...Show More Authors

 In this paper, we estimate the survival function for the patients of lung cancer using different nonparametric estimation methods depending on sample from complete real data which describe the duration of survivor for patients who suffer from the lung cancer based on diagnosis of disease or the enter of patients in a hospital for period of two years (starting with 2012 to the end of 2013). Comparisons between the mentioned estimation methods has been performed using statistical indicator mean squares error, concluding that the survival function for the lung cancer by using shrinkage method is the best

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Proposition of New Ensemble Data-Intelligence Models for Surface Water Quality Prediction
...Show More Authors

View Publication
Scopus (77)
Crossref (75)
Scopus Clarivate Crossref
Publication Date
Tue Sep 14 2021
Journal Name
Egyptian Journal Of Chemistry
Real wastewater Treatment by Electrocoagulation- Electro-oxidation Combined System: Optimization using Taguchi Approach
...Show More Authors

In this study, the optimum conditions for COD removal from petroleum refinery wastewater by using a combined electrocoagulation- electro-oxidation system were attained by Taguchi method. An orthogonal array experimental design (L18) which is of four controllable parameters including NaCl concentration, C.D. (current density), PH, and time (time of electrolysis) was employed. Chemical oxygen demand (COD) removal percentage was considered as the quality characteristics to be enhanced. Also, the value of turbidity and TDS (total dissolved solid) were estimated. The optimum levels of the studied parameters were determined precisely by implementing S/N analysis and analysis of variance (ANOVA). The optimum conditions were found to be NaCl = 2.5

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Combining Arabic Nested Noun Compound and Collocation Extraction Using Linguistic and Statistical Approach
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Pakistan Journal Of Medical And Health Sciences
Relation of red cell width diameter with some electrophysiological parameters of symptomatic sinus node patients in Iraq(Article)
...Show More Authors

Background: Dysfunction of sinoatrial node is a set of abnormal rhythms which are resulted from the sinoatrial node malfunctionof the sinus node, the chief natural cardiac pacemaker. The common, and occasionally, the single method for treatment of heart arrhythmias wasimplantation of pacemaker, which reduce symptoms exactly occurs after implantation. Aim: To detect the association between red cell width diameter (RDW) and some cardiac electrophysiology parameters in sinus node dysfunction in Iraqi patients such as SNRT and AH. Methods: A cross sectional study, was conducted on 59 patient ranging between 20-50 years old and involving 35 female and 24 male patients, suffering from an unexplained symptoms of sinoatrial node dysfunction (SND).

... Show More
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Development and Verification of the Capacity Curve for Two Dimensional Reinforced Concrete Moment-Resisting Frames System under Earthquake Loading
...Show More Authors

Pushover analysis is an efficient method for the seismic evaluation of buildings under severe earthquakes. This paper aims to develop and verify the pushover analysis methodology for reinforced concrete frames. This technique depends on a nonlinear representation of the structure by using SAP2000 software. The properties of plastic hinges will be defined by generating the moment-curvature analysis for all the frame sections (beams and columns). The verification of the technique above was compared with the previous study for two-dimensional frames (4-and 7-story frames). The former study leaned on automatic identification of positive and negative moments, where the concrete sections and steel reinforcement quantities the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref