Preferred Language
Articles
/
9BYIDIcBVTCNdQwC4TLT
Comparison of Single and Group Jet Grout Columns Settlement Based on Field Test and Theoretical Methods
...Show More Authors
Abstract<p>The settlement evaluation for the jet grouted columns (JGC) in soft soils is a problematic matter, because it is influenced by the number of aspects such as soil type, effect mixture between soil and grouting materials, nozzle energy, jet grouting, water flow rate, rotation and lifting speed. Most methods of design the jet-grouting column based on experience. In this study, a prototype single and group jet grouting models (single, 1*2, and 2*2) with the total length and diameter were (2000 and 150 mm) respectively and clear spacing (3D) has been constructed in soft clay and subjected to vertical axial loads. Furthermore, different theoretical methods have been used for the estimation of (JGC) settlement. Pile load settlement analysis of the jet grout columns showed that the average settlement values were (0.41, 0.663, and 1.5 mm) for the single, group (1*2) and group (2*2) jet grouted columns respectively. While, in the theoretical methods give a higher value of the settlement (2.0, 3.48, and 5.24 mm) for the single, group (1*2) and group (2*2) jet grouted columns compared with the settlement results acquired from field pile load test data. Therefore, it is not recommended to be used for soft clay. On the other hand, Fuller and Hoy’s, Hansen’s 90%, and Butler and Hoy’s results may be considered faithful interpretation methods for the single and group (1*2 and 2*2) (JGC).</p>
Crossref
View Publication
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Jul 24 2023
Journal Name
Research Journal Of Pharmacy And Technology
Comparison of the effects of Methotrexate and Etanercept on RANKL and OPG as Bone Metabolism Biomarkers in patients with Rheumatoid Arthritis
...Show More Authors

Rheumatoid arthritis is an autoimmune diseasecharacterized by chronic inflammationthat affects joints and cartilage. Bone complications such asRA-relatedosteoporosis are one of the most extra-articular manifestations. Many inflammatory mediators are released during RA disease pathophysiology; these mediators stimulate osteoclast genesis of bone by direct effects on RANKL and OPG. The study aimedto measure RANKL, OPG in RA patients treated with Etanercept only and other groups treated with Methotrexate onlyat baseline and after three months to evaluate bone state. An observational case-control prospective study was done on 30 RA patients who received MTX, 30 RA patients who received ETN, and 30 healthy,age-matched control groups. The

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jul 22 2020
Journal Name
University Of Baghdad
Feasibility of Water Sink-Based Gas Flooding to Enhance Oil Recovery in North Rumaila Oil Field
...Show More Authors

Publication Date
Mon May 05 2025
Journal Name
Assistive Technology
Evaluation the findings of WHO rapid assistive technology assessment (rATA) in Iraq: A field-based survey
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Research Express
Thermochromic and opacity behaviors in vanadium dioxide nanofilms: a theoretical study
...Show More Authors
Abstract<p>Vanadium dioxide nanofilms are one of the most essential materials in electronic applications like smart windows. Therefore, studying and understanding the optical properties of such films is crucial to modify the parameters that control these properties. To this end, this work focuses on investigating the opacity as a function of the energy directed at the nanofilms with different thicknesses (1–100) nm. Effective mediator theories (EMTs), which are considered as the application of Bruggeman’s formalism and the Looyenga mixing rule, have been used to estimate the dielectric constant of VO<sub>2</sub> nanofilms. The results show different opacity behaviors at different w</p> ... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Jan 05 2018
Journal Name
Asian Quarterly: An International Journal Of Contemporary Issue
Refugees and the Challenges for Language Education (LE): A Theoretical Study
...Show More Authors

DBN Rashid, Asian Quarterly: An International Journal of Contemporary Issue, 2018

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Materials Research Express
Thermochromic and opacity behaviors in vanadium dioxide nanofilms: a theoretical study
...Show More Authors
Abstract<p>Vanadium dioxide nanofilms are one of the most essential materials in electronic applications like smart windows. Therefore, studying and understanding the optical properties of such films is crucial to modify the parameters that control these properties. To this end, this work focuses on investigating the opacity as a function of the energy directed at the nanofilms with different thicknesses (1–100) nm. Effective mediator theories (EMTs), which are considered as the application of Bruggeman’s formalism and the Looyenga mixing rule, have been used to estimate the dielectric constant of VO<sub>2</sub> nanofilms. The results show different opacity behaviors at different w</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Proposed methods of image recognition depend on the PCA
...Show More Authors

This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and

... Show More
View Publication Preview PDF
Crossref