During the prior three decades numerous research works presented to investigate the behavior of reinforced soil. A, IJSR, Call for Papers, Online Journal
Seeds of five cultivars of oats (Avena sativa) were introduced from Italy in 2009. Seeds were propagated on the farm of the Dept. of Field Crops Sci. / Coll. of Agric. / Univ. of Baghdad in the season 2009 – 2010. The cultivars Anatolia, Alguda, Hamel, Pimula and Genzania were planted under 3 irrigation intervals; 3, 4 and 5 weeks to give water depth of 480, 400 and 320 mm, respectively . The depth of water was 80 mm each irrigation. A factorial experiment with RCBD of 4 replicates was conducted in 2 consecutive seasons in 2010 – 2011 and 2011 – 2012. The cultivar Alguda gave highest grain yield (8.07 t/ ha) under 480 mm, and 7.02 t / ha average of 3 water depths. This cultivar was characterized by high growth rate (13.2 g/m2/ d) that
... Show MoreThis study reports the fabrication of tin oxide (SnO2) thin films using pulsed laser deposition (PLD). The effect of 60Co (300, 900, and 1200 Gy) gamma radiation on the structural, morphological, and optical features is systematically demonstrated using X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM), atomic force microscopy (AFM), and ultraviolet-visible light analysis (UV-Vis), respectively In XRD tests, the size of the crystallites decreased from 45.5 to 40.8 nm for the control samples and from 1200 Gy to 60Co for the irradiated samples. Using FESEM analysis, the particle diameter revealed a similar trend to that attained using XRD; in particular, the average diameters were 93.8 and
... Show MoreThis study is a numerical investigation of the performance of reinforced concrete (RC) columns after fire exposure. This study aims to investigate the effect of introducing lateral ties and using the RC jacket on improving post-fire behavior of these columns, the effect of the duration of the fire on ultimate load of columns. The analysis was performed through ABAQUS, a 3D – non-linear finite element program. 4 m tall lengthening square RC column with a cross- section of 0.4 m × 0.4 m was used as a test specimen. The RC column was reinforced by 4Ø28 mm longitudinal bars bonded by steel tie bars of Ø10 mm spaced at 400 mm. The firing temperature was increased to 60
A hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More