Presents here in the results of comparison between the theoretical equation stated by Huang and Menq and laboratory model tests used to study the bearing capacity of square footing on geogrid-reinforced loose sand by performing model tests. The effects of several parameters were studied in order to study the general behavior of improving the soil by using the geogrid. These parameters include depth of first layer of reinforcement, vertical spacing of reinforcement layers, number of reinforcement layers and types of reinforcement layers The results show that the theoretical equation can be used to estimate the bearing capacity of loose sand.
The study aimed at the following:
Identify the differences in average scores core thinking skills kindergarten children by variable sex (male - female), and by variable age (5.6 - 5.11).
To achieve this researcher adopted a standardized test of core thinking skills for the kindergarten children, which was built and standardization by the researcher Meyada Asaad Mussa 2012 . applied test on a sample of (814) ) boys and girls who were randomly chosen form, from directorates of Baghdad Education Adoption of the proportional distribution.
... Show More
Purpose: To validate a UV-visible spectrophotometric technique for evaluating niclosamide (NIC) concentration in different media across various values of pH. Methods: NIC was investigated using a UV-visible spectrophotometer in acidic buffer solution (ABS) of pH 1.2, deionized water (DW), and phosphate buffer solution (PBS), pH 7.4. The characterization of NIC was done with differential scanning calorimeter (DSC), powder X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The UV analysis was validated for accuracy, precision, linearity, and robustness. Results: The DSC spectra showed a single endothermic peak at 228.43 °C (corresponding to the melting point of NIC), while XRD and FTIR analysis confirmed the identit
... Show MoreA lower extracellular pH is one of the few well-documented physiological differences between tumour and normal tissues. On the other hand, elevated glutathione (GSH) level has been detected in many tumours compared with healthy surrounding tissues. The compound II: 3-(9H-purin-6-yl-thio) carbonothionyl methyl-8-oxo-7-(2-thiophen-2-yl) acetamido-5-thia-1-azabicyclo-4-octo-ene-carboxylic acid was a cephalothin derivative contain 6-mercaptopurine (6-MP). Compound II react with general base catalysis in slightly acidic pH or with sulfhydryl nucleophiles to release the chemotherapeutic drug 6-MP. The generation of compound II was accomplished following multistep reaction procedures. The structure of compound II and its intermediate was confir
... Show MoreThe main objective of present work is to describe the feasibility of friction stir welding (FSW) for
joining of low carbon steel with dimensions (3 mm X 80 mm X 150 mm). A matrix (3×3) of welding
parameters (welding speed and tool rotational speed) was used to see influence of each parameter on
properties of welded joint .Series of (FSW) experiments were conducted using CNC milling machine
utilizing the wide range of rotational speed and transverse speed of the machine. Effect of welding
parameters on mechanical properties of weld joints were investigated using different mechanical tests
including (tensile and microhardness tests ). Micro structural change during (FSW) process was
studied and different welding zones
Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration
... Show MoreThis work deals with the preparation of a zeolite/polymer flat sheet membrane with hierarchical porosity and ion-exchange properties. The performance of the prepared membrane was examined by the removal of chromium ions from simulated wastewater. A NaY zeolite (crystal size of 745.8 nm) was prepared by conventional hydrothermal treatment and fabricated with polyethersulfone (15% PES) in dimethylformamide (DMF) to obtain an ion-exchange ultrafiltration membrane. The permeate flux was enhanced by increasing the zeolite content within the membrane texture indicating increasing the hydrophilicity of the prepared membranes and constructing a hierarchically porous system. A membrane contain
Polycystic ovarian syndrome, additionally called PCOS is the most widespread endocrine illness amongst women. The aetiology of PCOS is attributed to a multi-factorial interplay among environmental and genetic effects. The overarching goal evaluates the correlation among blood concentrations of total testosterone, sex-hormone-binding globulin (SHBG), estradiol (E2), follicle-stimulating hormone (FSH) and luteinizing hormone (LH) in ladies with PCOS and the impact of obesity, age, marital popularity on the obtained results. This study was conducted at the National Center for Educational Laborites /Medical City/ Baghdad. The study comprised of a sample of 83 women, elderly between 17 -45 years, who had been selected in a random manner
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More