This paper aimed to investigate the effect of the height-to-length ratio of unreinforced masonry (URM) walls when loaded by a vertical load. The finite element (FE) method was implemented for modeling and analysis of URM wall. In this paper, ABAQUS, FE software with implicit solver was used to model and analysis URM walls subjected to a vertical load. In order to ensure the validity of Detailed Micro Model (DMM) in predicting the behavior of URM walls under vertical load, the results of the proposed model are compared with experimental results. Load-displacement relationship of the proposed numerical model is found of a good agreement with that of the published experimental results. Evidence shows that load-displacement curve obtained from the FE model has almost the same trend of experimental one. A case study of URM walls was conducted to investigate the influence of the wall aspect ratio on its capacity and stress distribution due to a vertical load using DMM approach. In this paper, curves obtained that show a relationship between height level and generated compressive stress of walls with different aspects ratios and the strength of each URM wall and the DMM technique that has been utilized for numerical simulation.
The aim of this study is modeling the transport of industrial wastewater in sandy soil by using finite element method. A washing technique was used to remove the industrial wastewater from the soil. The washing technique applied with an efficient hydraulic gradient to help in transport of contaminant mass by advection. Also, the mass transport equation used in modeling the transport of industrial wastewater from soil includes the sorption and chemical reactions. The sandy soil samples obtained from Al-Najaf Governorate/Iraq. The wastewater contaminant was obtained from Al- Musyiebelectricity power plant. The soil samples were synthetically contaminated with four percentages of 10, 20, 30 and 40% of the contaminant and these percentages calc
... Show MoreAbstract: The aim of the research identify the effect of using the five-finger strategy in learning a movement chain on the balance beam apparatus for students in the third stage in the College of Physical Education and Sports Science, as well as to identify which groups (experimental and controlling) are better in learning the kinematic chain on the balance beam device, has been used The experimental approach is to design the experimental and control groups with pre-and post-test. The research sample was represented by third-graders, as the third division (j) was chosen by lot to represent the experimental group, and a division Third (i) to represent the control group, after which (10) students from each division were tested by lot to repr
... Show MoreThe assessment of a river water’ quality is an essential procedure of monitor programs and isused to collect basic environmental data. The management of integrated water resources in asustainable method is also necessary to allow future generations to meet their water needs. Themain objective of this research is to assess the effect of the Diyala River on Tigris River waterquality using Geographic Information System (GIS) technique. Water samples have beencollected monthly from November 2017 to April 2018 from four selected locations in Tigris andDiyala Rivers using the grab sampling method. Fourteen parameters were studied which areTurbidity, pH, Dissolved Oxygen, Biological Oxygen Demand, Electrical Conductivity, TotalDissolved Solids,
... Show MoreThe assessment of a river water’ quality is an essential procedure of monitor programs and is used to collect basic environmental data. The management of integrated water resources in a sustainable method is also necessary to allow future generations to meet their water needs. The main objective of this research is to assess the effect of the Diyala River on Tigris River water quality using Geographic Information System (GIS) technique. Water samples have been collected monthly from November 2017 to April 2018 from four selected locations in Tigris and Diyala Rivers using the grab sampling method. Fourteen parameters were studied which are Turbidity, pH, Dissolved Oxygen, Biological Oxygen Demand, Electrical Conductivi
... Show MoreThis article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.
Lower neck pain is one of the problems facing all ages, especially the elderly, as it revolves around the causes of this pain from many diverse factors. The aim of the research is to use special intense exercise accompanied by intermittent electrical stimulation to get rid of lower neck pain among professors of the College of Science - University of Baghdad for ages. (40-60) years and to identify the extent of the effect. The research assumed the presence of statistically significant differences. The research sample represented professors at the University of Baghdad - College of Science who suffer from continuous pain for the period between (10/15/2023) and (1/15/) 2024) and their number is (5), The researchers used the experimenta
... Show MoreThis study focused on a fundamental issue which was represented by ability of Iraqi central bank in facing the difficulty of determining the optimal ratio of liquidity in the Iraqi banks in terms of the balancing between its obligations to the depositors and borrowers, and liquidate their funds on one hand and the risks on the other hand.the search aimed for achieving the goals which represented by identifying the possibility of Iraqi banks to apply the regulations rules and instructions issued by central bank of Iraq in determining ratio of liquidity and its appropriate with Iraqi banks action to implement a reasonable profit to&
... Show MoreAbstract. Fibrewise micro-topological spaces be a useful tool in various branches of mathematics. These mathematical objects are constructed by assigning a micro-topology to each fibre from a fibre bundle. The fibrewise micro-topological space is then formed by taking the direct limit of these individual micro-topological spaces. It can be adapted to analyze various mathematical structures, from algebraic geometry to differential equations. In this study, we delve into the generalizations of fibrewise micro-topological spaces and explore the applications of these abstract structures in different branches of mathematics. This study aims to define the fibrewise micro topological space through the generalizations that we use in this paper, whi
... Show MoreWater pollution as a result of contamination with dye-contaminating effluents is a severe issue for water reservoirs, which instigated the study of biodegradation of Reactive Red 195 and Reactive Blue dyes by E. coli and Bacillus sp. The effects of occupation time, solution pH, initial dyes concentrations, biomass loading, and temperature were investigated via batch-system experiments by using the Design of Experiment (DOE) for 2 levels and 5 factors response surface methodology (RSM). The operational conditions used for these factors were optimized using quadratic techniques by reducing the number of experiments. The results revealed that the two types of bacteria had a powerful effect on biodegradable dyes. The regression analysis reveale
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More