In this paper, the penetration of the stone column was investigated in order to get the minimum length of the stone column above which the increase in length has little advantage. The effect of using different materials in column are also studied. The material used is granular of different angle of internal friction (). The results of the investigation indicated that the effect of stone column remains constant when the ratio of the thickness of the soft clay layer to the stone column’s diameter is more than 15. The results also indicated that a pronounced effect is obtained when the angle of internal friction of the stone column material is increased.
Background:. Children with spina bifida occulta require early surgery to prevent neurological deficits. The treatment of patients with a congenitally tethered cord who present in adulthood remains controversial.
Objective: The aim of this study is to describe the outcome obtained in 61 adult patients with congenital TCS and no prior surgical treatment who underwent surgical untethering.
Methods: This prospective study was conducted on 61 adult patients who underwent surgical untethering for spina bifida occulta at four neurosurgical centers in Baghdad / Iraq between March 2000 and January 2018. Patients who had undergone prior myelomeningocele repair or tet
... Show MoreThe main aim of this research is to: 1) identify the Transformational Leadership of the Managers of higher School in ALkut district and its relationship with organizational Loyalty. 2) Clarify the relationship between Transformational Leadership and organizational Loyalty. Regarding the research methodology, the researcher used the descriptive method because it meets this research. The two research tools were a questionnaire and the statistical program (spss). The results revealed that there is a strong positive relationship between Transformational Leadership and organizational Loyalty, which means that when the managers have a Transformational Leadership leads to having organizational loyalty.
This current research aims to reveal the difference between the levels of teaching expertise of physics teachers according to the years of service by answering the following question: does the educational skill level of physics teachers work according to the service? The sample of the study consisted of (225) physics teachers by (125) females (56%), and (100) males (44%), distributed on (4) education directorates in Baghdad governorate on both sides of al-Karkh and al-Rusafa. In order to achieve the aim of the study, the researcher prepared a note card for expertise teaching, consisting of (39) paragraphs distributed into (5) fields. The apparent validity and reliability of the card were verified through an agreement (the researcher hers
... Show MoreGas hydrate formation is considered one of the major problems facing the oil and gas industry as it poses a significant threat to the production, transportation and processing of natural gas. These solid structures can nucleate and agglomerate gradually so that a large cluster of hydrate is formed, which can clog flow lines, chokes, valves, and other production facilities. Thus, an accurate predictive model is necessary for designing natural gas production systems at safe operating conditions and mitigating the issues induced by the formation of hydrates. In this context, a thermodynamic model for gas hydrate equilibrium conditions and cage occupancies of N2 + CH4 and N2 + CO4 gas mix
The undetected error probability is an important measure to assess the communication reliability provided by any error coding scheme. Two error coding schemes namely, Joint crosstalk avoidance and Triple Error Correction (JTEC) and JTEC with Simultaneous Quadruple Error Detection (JTEC-SQED), provide both crosstalk reduction and multi-bit error correction/detection features. The available undetected error probability model yields an upper bound value which does not give accurate estimation on the reliability provided. This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreThe European Unit has never been affected by a serious phenomena as the phenomena of the advancing of the far right parties. Though these parties vary in their impact in their original countries, they agree on one important issue which is the deconstruction of the European unit and limiting its supernational powers. These increasing popular parties aim at more national independence in decision making away from the decisions taken by Brussels. Moreover, they criticize the financial and administrative corruption accompanied many of the rescuing procedures directed for example towards countries like Greece and Spain during the international economic crisis. This failure nourishes many of the negative feelings against the European unit which
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show More