The settlement evaluation for the jet grouted columns (JGC) in soft soils is a problematic matter, because it is influenced by the number of aspects such as soil type, effect mixture between soil and grouting materials, nozzle energy, jet grouting, water flow rate, rotation and lifting speed. Most methods of design the jet-grouting column based on experience. In this study, a prototype single and group jet grouting models (single, 1*2, and 2*2) with the total length and diameter were (2000 and 150 mm) respectively and clear spacing (3D) has been constructed in soft clay and subjected to vertical axial loads. Furthermore, different theoretical methods have been used for the estimation of (JGC) settlement. Pile load settlement analysis of the jet grout columns showed that the average settlement values were (0.41, 0.663, and 1.5 mm) for the single, group (1*2) and group (2*2) jet grouted columns respectively. While, in the theoretical methods give a higher value of the settlement (2.0, 3.48, and 5.24 mm) for the single, group (1*2) and group (2*2) jet grouted columns compared with the settlement results acquired from field pile load test data. Therefore, it is not recommended to be used for soft clay. On the other hand, Fuller and Hoy’s, Hansen’s 90%, and Butler and Hoy’s results may be considered faithful interpretation methods for the single and group (1*2 and 2*2) (JGC).
The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreRheumatoid arthritis is an autoimmune diseasecharacterized by chronic inflammationthat affects joints and cartilage. Bone complications such asRA-relatedosteoporosis are one of the most extra-articular manifestations. Many inflammatory mediators are released during RA disease pathophysiology; these mediators stimulate osteoclast genesis of bone by direct effects on RANKL and OPG. The study aimedto measure RANKL, OPG in RA patients treated with Etanercept only and other groups treated with Methotrexate onlyat baseline and after three months to evaluate bone state. An observational case-control prospective study was done on 30 RA patients who received MTX, 30 RA patients who received ETN, and 30 healthy,age-matched control groups. The
... Show MoreVanadium dioxide nanofilms are one of the most essential materials in electronic applications like smart windows. Therefore, studying and understanding the optical properties of such films is crucial to modify the parameters that control these properties. To this end, this work focuses on investigating the opacity as a function of the energy directed at the nanofilms with different thicknesses (1–100) nm. Effective mediator theories (EMTs), which are considered as the application of Bruggeman’s formalism and the Looyenga mixing rule, have been used to estimate the dielectric constant of VO2 nanofilms. The results show different opacity behaviors at different w
DBN Rashid, Asian Quarterly: An International Journal of Contemporary Issue, 2018
Vanadium dioxide nanofilms are one of the most essential materials in electronic applications like smart windows. Therefore, studying and understanding the optical properties of such films is crucial to modify the parameters that control these properties. To this end, this work focuses on investigating the opacity as a function of the energy directed at the nanofilms with different thicknesses (1–100) nm. Effective mediator theories (EMTs), which are considered as the application of Bruggeman’s formalism and the Looyenga mixing rule, have been used to estimate the dielectric constant of VO2 nanofilms. The results show different opacity behaviors at different w
This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and
... Show More