This study introduces a series of single and pile group model tests subjected to lateral loads in . multilayered sand from Karbala, Iraq. The aim of this study is to investigate: the performance of the pile groups subjected to lateral loads; in which the pile batter inclination angle is changed; the effect of pile spacing (s/d) ratio, the influence of using different number of piles and pile group configuration. Results revealed that the performance of single negative (Reverse) Battered piles with inclination of 10° and 20° show a gain of 32% and 76 % in the ultimate lateral capacity over the regular ones. For pile groups, the use of a combination of regular, negative and positive battered piles in different angles of inclination within the same group shows a significant increase in the ultimate lateral load carrying capacity. Increasing the spacing between piles in groups of the same category shows an increase in the group efficiency, also changing the piles number within the group by using different patterns will influence the ultimate lateral resistance of the pile group.
This book presents the problem of tooth decay due to bacteria Streptococcus mutans one of methods of treatment using 3 extracts of S. persica (miswak) (aqueous, acetone and methanol) and prove its effectiveness and its impact on the gtf (B, C, and D) genes that code the glucosyltransferase (Gtf) enzymes that cause decay membrane compared to the usual means used for the prevention of tooth decay
Parties as active units in this process in order to work must have access to sources of funding in order to maintain their political presence in society and participate in the process of electoral competition, To win the election, bolstering the huge role that money has played in influencing the principle of equality among contestants in the elections. Those who own money will have a greater chance of winning the elections while less competitive opportunities for others who do not own the money or what they own does not give them the competitive ability to win elections. From this point of view, controlling political finance through legal regulation and institutional, media and popular monitoring has become an important requirement
... Show MoreThis study assesses the short-term and long-term interactions between firm performance, financial education and political instability in the case of Malaysia Small to Medium Enterprises (SMEs). The simultaneous insertion of financial education and political instability within the study is done intentionally to inspect the effect of these two elements in one equation for the Malaysian economy. Using the bound testing methodology for cointegration and error correction models, advanced within an autoregressive distributed lag (ARDL) framework, we examine whether a long-run equilibrium connection survives between firm performance and the above mentioned independent variables. Using this method, we uncover evidence of a positive long-term link b
... Show Moremajor goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. Th
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreAbstract:
Objective: The study was done to evaluate nurses’ knowledge and practices toward physical restraint at critical care unit
Methodology: Fifty nurses, who were selected by a non-probability (convenient) sampling method, participated in this descriptive study. The instrument of the study was knowledge parts of the questionnaire were initially developed in the U.S.A for nursing homes; in 2006 they were adopted for all hospital units by the original developers. The knowledge section of the questionnaire consisted of 20 items, which were used to measure knowledge of nurses towards the definition, indications and contra
... Show More