Preferred Language
Articles
/
pxb4JIcBVTCNdQwC0Dr1
A PROPOSED PROCEDURE FOR ANALYSING REINFORCED EMBANKMENTS

Publication Date
Sat Apr 21 2012
Journal Name
Arabian Journal For Science And Engineering
A Procedure for Analysing Reinforced Embankments

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 28 2003
Journal Name
Journal Of Engineering
STABILITY OF UNREINFORCED AND REINFORCED EMBANKMENTS ON SOFT SOILS

Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Proposed Approach for Analysing General Hygiene Information Using Various Data Mining Algorithms

General medical fields and computer science usually conjugate together to produce impressive results in both fields using applications, programs and algorithms provided by Data mining field. The present research's title contains the term hygiene which may be described as the principle of maintaining cleanliness of the external body. Whilst the environmental hygienic hazards can present themselves in various media shapes e.g. air, water, soil…etc. The influence they can exert on our health is very complex and may be modulated by our genetic makeup, psychological factors and by our perceptions of the risks that they present. Our main concern in this research is not to improve general health, rather than to propose a data mining approach

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
RELIABILITY ANALYSIS OF THE SEISMIC STABILITY OF EMBANKMENTS REINFORCED WITH STONE COLUMNS

Geotechnical engineers have always been concerned with the stabilization of slopes. For this purpose,
various methods such as retaining walls, piles, and geosynthetics may be used to increase the safety factor of slopes prone to failure. The application of stone columns may also be another potential alternative for slope stabilization. Such columns have normally been used for cohesive soil improvement. Most slope analysis and design is based on deterministic approach i.e a set of single valued design parameter are adopted and a set of single valued factor of safety (FOS) is determined. Usually the FOS is selected in view of the understanding and knowledge of the material parameters, the problem geometry, the method of analysis and the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Lecture Notes In Civil Engineering
Proposed Design Charts for Reinforced Concrete Spread Foundations Subjected to Concentric Load

The design of reinforced concrete spread foundations mainly depends on soil bearing capacity, loading value, and column size. So for each design case, tiresome calculations and time consumption are needed. In this paper, generalized design charts are presented and plotted according to derivations based on the ACI 318 M-2019 Code. These charts could be used directly by the structural designers to estimate the column size, foundation thickness, and dimensions as well as the foundation reinforcement under a certain given concentric load assuming a uniformly distributed contact pressure underneath the foundation. Of noteworthy, these charts are oriented to deal with square isolated footings with a square concentric column, covering reasonable r

... Show More
View Publication
Crossref
Publication Date
Wed Jan 05 2022
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Pneumomediastinum following a dental procedure

Background: Subcutaneous emphysema is a common presentation to the emergency department. The presence of emphysema in the head and neck region due to dental procedure is not common, and the presence of pneumomediastinum is exceedingly rare.

Case Report: A young lady, presented to the emergency department with chest pain, found to have pneumomediastinum following a dental procedure including a wisdom tooth extraction.

Conclusion: Complications following dental procedures are not uncommon, hence there should be a high index of suspicion for the emergency physicians for such patients, especially those where air turbine dental tools have been used.

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography

Publication Date
Thu May 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography

Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography

View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Slot Design Procedure for a NACA 4412 at High Angle of Attack

The main objective of the present work is to find a method increases the efficiency of the airfoil that is used for blade in wind turbine, wing in aircraft, propeller and helicopter (like NACA 4412). By overcoming the separation of flow at high angle of attacks, a slotted airfoil had been used and solved numerically through connecting the pressure side in the bottom surface with the suction side in the top surface of the airfoil to energize the separated flow. Slot exit, width and slope were considered as a parameters of slot configuration to determine the effective design of consideration. Reynolds number was taken as [1.6 x106 ] and the angle of attacks were ranged from (0o - 20o ). The numerical solution with Ansys Fluent commercial prog

... Show More
View Publication
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A Proposed Agent System for Network Monitoring

The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente

... Show More
View Publication Preview PDF
Crossref