This paper analyzes the effect of scaling-up model and acceleration history on seismic response of closed-ended pipe pile using a finite element modeling approach and the findings of 1 g shaking table tests of a pile embedded in dry and saturated soils. A number of scaling laws were used to create the numerical modeling according to the data obtained from 1 g shake table tests performed in the laboratory. The current study found that the behaviors of the scaled models, in general have similar trends. From numerical modeling on both the dry and saturated sands, the normalized lateral displacement, bending moment, and vertical displacement of piles with scale factors of 2 and 35 are less than those of the pile with a scale factor of 1 and the
... Show MoreInitially-produced isotopes during the course of the
This search include the synthesis of some new 1,3-oxazepine derivatives have been prepared, starting from reaction of L-ascorbic acid with dry acetone in presence of dry hydrogen chloride afforded the acetal (I). Treatment of the latter with p-nitrobenzoyl chloride in dry pyridine yielded the ester (II) which was dissolved in (65%) acetic acid in absolute ethanol yielded the glycol (III). The reaction of the glycol (III) with sodium periodate in distilled water at room temperature produced the aldehyde (IV). The compound (V) [2-amino-5-mercapato-1,3,4-thiadiazole] was prepared through the reaction of thiosemicarbazide with carbon disulphide (CS2) in entity of anhydrous (Na2CO3) in (abs. ethanol ). Compound (VI) [2-(5-mercapto-1,3,4-thiadiaz
... Show MoreAbstract : This research is a field study of international cities that hosted various events of which (Sports, Exhibitions, Scientific, Cultural) and other events, these positive impacts on the city driven by such hosts were identified. The research goal was to support hosting events to improve the hostess city and to draw future plans for further developments and to invest event’s hosting to strengthen the city’s value according to a strategic vision that looks for the future the most important conclusions are Entering events hosting is a part of urban development strategies and The most important recommendations are coordination between hosting event activities and its facilities with the infrastructure structure of the host city, its
... Show MoreThe electron correlation for inter-shells (1s 2p), (1s 3p) and (1s 3d) was described by the inter-particle radial distribution function f(r12). It was evaluated for Li-atom in the different excited states (1s2 2p), (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). The inter particle expectation values for these shells were also evaluated. The calculations were performed using Mathcad 14 program.
Human interest in negative space has existential roots, in addition to its cognitive value of things. In the environment, it includes space features from facts and activities, as negative space plays an active role in the field of visual perception, and this value comes from the need to absorb vital relationships in its environment, Man represents the positive part of negative space through his presence in this environment, and therefore this is reflected in the design of its types and the function of each element in the design, for the real effectiveness that the elements gain and their impact comes through the negative space that surrounds them and organizes their relationships with other elements, that the orientation is distributed a
... Show MoreThis study identifies the contribution of some positive variables (happiness, optimism, and hope) to the level of psychological health in the practitioners of the nursing profession in Algeria, a total of (38) male and female nurses were employed as research sample. The researcher used a scale to measure happiness, optimism, hope, and psychological health. The results showed that the level of psychological health varies depending on the positive variables (happiness, optimism), as well as it depends on the variables of gender and professional Experience.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More