Screw piles are widely used in supporting structures subjected to pullout forces, such as power towers and offshore structures, and this research investigates their performance in gypseous soil of medium relative density. The bearing capacity and displacement of a single screw pile model inserted in gypseous soil with various diameters (D = 20, 30, and 40) mm are examined in this study. The soil used in the testing had a gypsum content of 40% and the bedding soil had a relative density of 40%. To simulate the pullout testing in the lab, a physical model was manufactured with specific dimensions. Three steel screw piles with helix diameters of 20, 30, and 40 mm are used, with a total length of 500 mm. The helix is continuous over the pile's embedded depth of 400 mm. The results of tests revealed that decreasing the length to diameter (H/D) ratio resulted in a higher pullout capacity of screw piles and a lower corresponding displacement.
Objective(s): To evaluate nurses’ Practice toward neonatal endotracheal suctioning procedure, and to determine the effectiveness of the interventional program on nurses’ practices, as well as to find out the relationship between nurses’ practice and their demographic characteristics.
Methodology: A Pre-experimental, one group design, was carried out to achieve the objectives of the current study using the evaluation approach and the implementation of the education program for the period from January 17 to June 31, 2022. A non- probability, purposive sample of (24) nurses were selected from the Neonatal Intensive Care Unit at Pediatric Teaching Hospital/ Medical City Department. A checklist w
... Show MoreThe combination of carbon nanotubes (CNT) and conducting polymers offers an attractive route for the production of novel compounds that can be used in a variety of applications such as sensors, actuators, and molecular scale electronic devices. In this work, functionalized multiwall carbon nanotubes (f-MWCNTs) were added in different load ratios (3 wt%, 5 wt% and 10 wt%) to thiophen (PTh) polymer to procedure PTh/CNTs nanocomposite and deposited on porous silicon substrate by electropolarization. Photoconductive detectors were fabricated using PTh/f-MWCNTs matrix to work in the near region and middle IR regions. These detectors were illuminated by semiconductor laser diode wavelength of 808(nm) and Nd-YAG laser of wavelength 1064 (n
... Show MoreThe choice of gate dielectric materials is fundamental for organic field effect transistors (OFET), integrated circuits, and several electronic applications. The operation of the OFET depends on two essential parameters: the insulation between the semiconductor layer and the gate electrode and the capacitance of the insulator. In this work, the electrical behavior of a pentacene-based OFET with a top contact / bottom gate was studied. Organic polyvinyl alcohol (PVA) and inorganic hafnium oxide (HfO2) were chosen as gate dielectric materials to lower the operation voltage to achieve the next generation of electronic applications. In this study, the performance of the OFET was studied using monolayer and bilayer gate insulators. To mo
... Show MoreThe woman represents an existential dualism with the man along history. This existence has been manifested through the history of Art starting from the arts of the old civilizations until modernism. It must be said that the history of Art refers to her presence as an extension for this history in the oriental arts, and the Arab countries including Iraq. The woman has varying outputs in terms of the content of her presence and the style of presentation. In her characterizations: maternity, fertility, femininity and others. The Iraqi artists adopted these fields among them the artist Jaber Alwan who formulated his style of presentation and its units depending on the feminine presence and his experience in her formal and stylistic fie
... Show MoreProteinases (E.C.3.4.21) family are widely distributed in the nature; it was present in animals tissues , plants and microbial cell . Protease was purified from Zahdi seed (Phoenix dactylifera L.) by several steps included ammonium sulphite ppt (75%) saturation and dialyzed against the 80mM sodium phosphate buffer at pH 7.5 . The enzyme specific activity was 407.62 unit/mg protein. The obtained extract was purified by DEAE-Cellulose column followed by gel filtration through Sephacyl S-200 column .The enzyme specific activity ,yield and purification fold were 1873.49 unit/mg protein, 22.99 and 58.42% respectively. The results of protease characterization showed that the molecular weight was 25118 daltons as determined by gel f
... Show MoreThis study intends to examine the efficiency of student-centered learning (SCL) through Google classroom in enhancing the readiness of fourth stage females’ pre-service teachers. The research employs a quasi-experimental design with a control and experimental group to compare the teaching readiness of participants before and after the intervention. The participants were 30 of fourth stage students at the University of Baghdad - College of Education for Women/the department of English and data were collected through observation checklist to assess their teaching experience and questionnaires to assess their perceptions towards using Google Classroom. Two sections were selected, C as a control group and D as the experimental one each with (
... Show MoreTo investigate the prevalence of true periodontal chief complaints (CC) and the factors affecting their reporting by patients with periodontal diseases (PD).
This cross‐sectional study was based on retrospective analysis of available periodontal records. Different personal and demographic variables were obtained from these records including CC, age, gender, working status, past medical/dental history, smoking status and diagnosis. In addition, clinical parameters of plaque index, gingival index, probing pocket depth (PPD), and number of missing teeth. Periodontal CC were r
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More