The Karolinka earth-fill dam was constructed between 1977 and 1984 on the Stanovnice river above the town of Karolinka in the region of Vsetínsko in Czech Republic. Because of leakage on the downstream dam face due to technological indiscipline when filling dam layers during the dam construction stage, there were some steps to improve state dam safety. The final rehabilitation is to construct the diaphragm walls from self-hardening cement-bentonite suspension along the length of the dam. In addition to connecting the gallery and abutment (2 × 25 m long) by using jet piles. The article presents numerical modeling of safety factor evaluation associated with the state of the dam body and foundation; before, and after sealing. Also, studying the effect of dam height on its stability by using finite element method is performed by the Plaxis 3D program in the case study of Karolinka dam. It is concluded that measured data shows good agreement with the computed result.
This study aimed to investigate the impacts of the Trigonella foenum-graecum (T. foenum-graecum) seeds on the female gonad. A total of twenty local rabbits were used in this study; were divided into four groups (5 each): first group (G1) was considered as the control group. The second group (G2), third group (G3) and fourth group (G4) were fed daily1.5%, 3%, and 4.5% of T. foenum-graecum seeds respectively for 60 days (twice daily). At the end of the experiment, the animals were euthanized by diethyl ether (C2H52O). Then the abdomen was incised, and the samples of ovaries were collected and fixed by 10% neutral buffered formalin. The histological assessment was done with a paraffin embedding technique and the histological sections w
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MorePharmaceutical-instigated pollution is a major concern, especially in relation to aquatic environments and drugs such as meropenem antibiotics. Adsorbents, such as multi-walled carbon nanotubes, offer potential as means of removing polluting meropenem antibiotics and other similar compounds from water. In order to evaluate the effectiveness of multi-walled carbon nanotubes in this capacity, various experimental parameters, including contact time, initial concentration, pH, temperature and the dose of adsorbent have been investigated. The Langmuir and the Freundlich isotherm models have been used. The data obtained using a modified Langmuir model have been consistent with the experimental ones; the best pH value has been obtained to have the
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon the most honorable of God’s creation, Muhammad bin Abdullah, the illiterate Arab prophet, the faithful, and his family and companions.
And yet ...
The realistic view is that Islamic jurisprudence is not exaggerated in the judgment of compensation, so it is judged for everything that has been lost by the victim of a profit or his loss, but he takes into account the bearing of the guarantee between profit and loss or the principle on which the theory of bearing liability is found, and it is clear through research that Islam The principle of respecting money, souls and rights is considered a public order, but it may exclude some ca
... Show MoreHuman interferon as is the case in all kinds of interferon has complex effects but all share their impact on preventing the proliferation of viruses and preventing or reducing human Alantervjørn conversion occurs if the cell is in preventing the growth of the virus when interferon Balnmstqubl connects
Muscid flies Musca domestica L., M. biseta Hough, M. crassirostris Stein, M. sorbens Wied., Muscina stabulans (Fallen), Atherigona orientalis Schiner, Atherigona sp. and Limnophora quaterna (Loew) were captured by using yellow sticky traps from different provinces of Iraq during November 2010. The results showed the highest percentage of all collected species were recorded in Babylon (48.33%), while the lowest percentage was observed in Baghdad (4.88%). Musca domestica was the predominant species and was ranked first in overall prevalence in all provinces studies, while M. biseta was the lowest abundant specie
Adhrt all fungal biological control ability Tdhadah less than 2 repel Alaftran Almamradan showed leaky mushroom Biological control is thermally laboratories and different concentrations of 5, 10 and 20% inhibition in the growth of fungus colonies amounted to 3.8 cm and 3.1 and 2.4 respectively in comparison with control 9 cm
يهدف البحث الحالي الى استكشاف علاقات التفاعل والتاثير بين الاحتكام للمكانة والتوجه للفردية– الجماعية والدمج التنظيمي مستنداً على مزج اختلاف القيم الشخصية مع افكار نظرية الهوية الاجتماعية لبلورة نموذج البحث. وفي ضوء هذا تم صياغة عدد من الفرضيات التي توضح علاقات التفاعل ما بين ابعاد الاحتكام للمكانة والتوجه للفردية– الجماعية للتنبؤ بوجود الدمج التنظيمي. جمعت البيانات باستخدام استمارة الاستبيان ووزع
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More