
ABSTRACT In dam construction stages when an earth embankment has retained a reservoir with constant water surface elevation for a long time, seepage conditions within the embankment will be reach a steady state. If it is necessary to drain the reservoir quickly, the pore-water pressures in the embankment may remain relatively high while the stabling effect of the reservoir's weight along the upstream (U/S) side for the embankment has removed. This process is referring to as "Rapid Drawdown" and may be cause instability in the upstream (U/S) face of the embankment. Kongele dam is one of the proposed earth dams to be implement within the current plan in Iraq. The authors study pore water pressure and the effect of rapid drawdown for the dam d
... Show MoreThis paper presents a three-dimensional Dynamic analysis of a rockfill dam with different foundation depths by considering the dam connection with both the reservoir bed and water. ANSYS was used to develop the three-dimensional Finite Element (FE) model of the rockfill dam. The essential objective of this study is the discussion of the effects of different foundation depths on the Dynamic behaviour of an embanked dam. Four foundation depths were investigated. They are the dam without foundation (fixed base), and three different depths of the foundation. Taking into consideration the changing of upstream water level, the empty, minimum, and maximum water levels, the results of the three-dimensional F
A prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc
... Show MoreThis work presents a five-period chaotic system called the Duffing system, in which the effect of changing the initial conditions and system parameters d, g and w, on the behavior of the chaotic system, is studied. This work provides a complete analysis of system properties such as time series, attractors, and Fast Fourier Transformation Spectrum (FFT). The system shows periodic behavior when the initial conditions xi and yi equal 0.8 and 0, respectively, then the system becomes quasi-chaotic when the initial conditions xi and yi equal 0 and 0, and when the system parameters d, g and w equal 0.02, 8 and 0.09. Finally, the system exhibits hyperchaotic behavior at the first two conditions, 0 and 0, and the bandwidth of the chaotic
... Show MoreBackground: Pervasive Developmental Disorder (PDD) is a term refers to the overarching group of conditions to which autism spectrum disorder (ASD) belongs .
Objective: This study was designed to determine the existing behavior of children with autism in dental sitting, the behavior improvements in recall dental visits and evaluate the improvement in oral hygiene with using specific visual pedagogy chart.
Type of the study: Cross-sectional study.
Methods: Forty children of both genders, ages ranged from 4 – 6 years having primary teeth only were selected whose medical history included a diagnosis
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
The current study aims to find out:
- The ingratiating behavior of university students.
- The differences of statistical significance in The ingratiating behavior among university students according to the variables of sex and specialization
The current study is determined by University of Baghdad students of both genders (males and females) and for both majors (scientific and humanities) for the academic year (2019-2020).
In order to achieve the researcher's objectives:Ingratiating behavior scale has been constructed. It consists in its final form of (32) items divided into four behaviors. The researcher has extracted scale validity and reliability.
The researcher based the two scales
... Show MoreThe remediation oil production by matrix acidizing method on the well named "X" (for confidential reasons) is scrutinized in this paper. Initial production of 1150 bpd, production index of 2.8 STB/Psi/d and permeability of 150md, in 2018 two years down the lane this dropped to 450 bpd, production index 0.7 STB/Psi/d. The declined observed on the production index is trouble shouted and after elimination of (no completion damage/perforation damage), the skin is calculated by carrying out a well test (build-up test) whose extrapolation in excel over times gave us a skin of 40.The reservoir heterogeneity, containing >20% of feldspar, carbonates and paraffin’s guided thematrix acidizing design and treatment proposition to remedy thi
... Show More