Highly plastic soils exhibit unfavorited properties upon saturation, which produce different defects in engineering structures. Attempts were made by researchers to proffer solutions to these defects by experimenting in practical ways. This included various materials that could possibly improve the soil engineering properties and reduce environmental hazards. This paper investigates the strength behavior of highly plastic clay stabilized with brick dust. The brick dust contents were 10%, 20%, and 30% by dry weight of soil. A series of linear shrinkage and unconfined compression tests were carried out to study the effect of brick dust on the quantitative amount of shrinkage experienced by highly plastic clay and the undrained shear strength. The effect of curing on soil shear strength was included in this paper. It was found that the critical behavior of highly plastic soil can be mitigated by mixing with 20% or 30% of brick dust. The undrained shear strength of highly plastic clay mixed with brick dust increased with the increase of brick dust content up to 20%. It was affected by the curing period. The best improvement was achieved when the optimum content of brick dust was 20%. Finally, seven days of curing improved the undrained shear strength with over 100%.
The importance of the research lies in developing flexibility exercises (positive and negative) that help improve the level of physical and skill performance, address some weak points, and develop factors that work to implement skills with a wider range of motion, accuracy, and high strength. This is what makes the game of badminton more developed and successful. Performing (dimensions) strokes And the forward projection) by not using the wrist and the correct movement of the striking arm. This makes the player’s performance ineffective, which requires her to practice flexibility and movement flow to address this weakness. The study aims to prepare exercises using flexibility (positive and negative) and to know the e
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn this paper we will investigate some Heuristic methods to solve travelling salesman problem. The discussed methods are Minimizing Distance Method (MDM), Branch and Bound Method (BABM), Tree Type Heuristic Method (TTHM) and Greedy Method (GRM).
The weak points of MDM are manipulated in this paper. The Improved MDM (IMDM) gives better results than classical MDM, and other discussed methods, while the GRM gives best time for 5≤ n ≤500, where n is the number of visited cities.
This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)
... Show MoreIn the task of detecting intrinsic plagiarism, the cases where reference corpus is absent are to be dealt with. This task is entirely based on inconsistencies within a given document. Detection of internal plagiarism has been considered as a classification problem. It can be estimated through taking into consideration self-based information from a given document.
The core contribution of the work proposed in this paper is associated with the document representation. Wherein, the document, also, the disjoint segments generated from it, have been represented as weight vectors demonstrating their main content. Where, for each element in these vectors, its average weight has been considered instead of its frequency.
Th
... Show MoreThe paper aims at investigating the content of particles and minerals of soft clay soil in the Mekong Delta coastal provinces, southern Vietnam, as well as improving soil stability using inorganic adhesives, i.e.lime and cement-based stabilization. To study the composition of soft clay soil, a series of different laboratory methods were carried out and revealed various characteristics related to mineral composition, pH value, soluble salt content, and grain particle composition of soft clay soils. The results demonstrated five soil subtypes, namely high – saline soil (S2), low-saline soil (S1), acid sulfate soil (A), acid sulfate - saline soil (S-A), soil without salt and
acid sulfate content (S0- A0). The soft clay soil (C) in
In this paper, we study a single stress-strength reliability system , where Ƹ and ƴ are independently Exponentiated q-Exponential distribution. There are a few traditional estimating approaches that are derived, namely maximum likelihood estimation (MLE) and the Bayes (BE) estimators of R. A wide mainframe simulation is used to compare the performance of the proposed estimators using MATLAB program. A simulation study show that the Bayesian estimator is the best estimator than other estimation method under consideration using two criteria such as the “mean squares error (MSE)” and “mean absolutely error (MAPE)”.