The construction of embankment for roadway interchange system at urban area is restricted due to the large geometry requirements, since the value of land required for such construction is high, and the area available is limited as compared to rural area. One of the optimum solutions to such problem is the earth reinforcement technique which requires a limited area for embankment construction. Gypseous soil from Al-Anbar governorate area was obtained and subjected to various physical and chemical analysis to determine it is properties. A laboratory model box of 50x50x25 cm was used as a representative embankment; soil has been compacted in five layers at maximum dry density (modified compaction) and an aluminum reinforcement strips were introduced between layers. The model was subjected to cyclic loading and the vertical and lateral deformations were detected at different stages of loading cycles using LVDT. The reinforced soil embankment under soaking condition exhibited vertical settlement at the top surface was (12.55 mm) while the lateral displacements at (1st, 3rd layer) were (2.18, 1.32) mm respectively at (47 load cycles).For reinforced gypseous soil, embankment without soaking cured for 24 hours, the Number of load cycles was found to be (165) loading cycles with vertical displacement (9.12 mm), that means an improvement of 59%. Accordingly, the lateral displacement in 1st and 3rd layers were (3.28, 2.59) mm respectively which observes improvement by (28% and 5%) respectively. The rates of improvement are taken with respect to the reinforced pure dry soil sample.
Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreAerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph
Background: There is a strong desire of adolescent to have a peer group and to be appreciated and also to become a member of this group which can affect one each other. There for; encourage, adapting,and imitating of friends and group consider as the main reasons behind starting of smoking among youngsters. Smoking habits in the family were found tobe acause of smoking pressure among adolescentas peer pressure. Smoking habit may be started before 18 years of age in most adult smokers.
Objectives: To study the effect of peer pressure and family smoking habiton the prevalence of smoking among secondary school students.
Type of the study: A cross
... Show MoreAutorías: Muwafaq Obayes Khudhair, Sanaa Rabeea Abed, Hayder Talib Jasim. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 1, 2023. Artículo de Revista en Dialnet.
A field experiment was carried out in the fields of the Field Crops Department - Faculty of Agricultural Engineering Sciences. The study included five inbred lines (ZM43W (ZE), ZM60, ZM49W3E, ZM19, CDCN5), given numbers 1, 2, 3, 4 and 5) to study the hybrid vigor and both general and special combing ability (GCA, SCA) of the half diallel mating method, for the spring and fall seasons (2016). The genetic analysis shows that all crosses gave a positive hybrid vigor for grain yield per unit area at the two population densities. the highest value is 116.20% for cross (3´5 )at low density, and 89.22% for cross( 1´4 )at high density. The hybrid vigor for all crosses is positive at two densities for dry matter yield, crop growth rate an
... Show MoreIraq has seen many changes at the social, economic and political levels. This led to cause many shifts in the structure of its society and imposed great challenges reflected in the behavior and awareness of that society in general and youth in particular.
Those changes made the Iraqi society undergoing the transformation of value and culture aspects formed a political awareness that caused cultural and political diversity within the family and society. A greater openness to the outside world caused by the communication revolution, as the world has witnessed during the past two decades, has helped in making that change. Iraq had its share of media and political openness, which were included after the US occupation in 2003. As a re
... Show More