In this experimental study, the use of stone powder as a stabilizer to the clayey soil studied. Tests of Atterberg limits, compaction, fall cone (FCT), Laboratory vane shear (LVT), and expansion index (EI) were carried out on soil-stone powder mixtures with fixed ratios of stone powder (0%, 5%, 10%, 15%, and 20%) by the dry weight. Results indicated that the undrained shear strength obtained from FCT and LVT increased at all the admixture ratios, and the expansion index reduced with the increase of the stone powder.
Tigris River is one of the main important surface water resources in Iraq. This necessitates continuous study of its quality . The present study is concerned with the characteristics and quality of Tigris water passing through in Baghdad city. (eight) samples were collected from the river in the area Grea't City. The study periods were carried over four season, which has been sampled once represent the every season. First sampling 12-11-2012 represent the autumn season The second sampling 20-1-2013 to represent the winter season. The third in 25-3- 2013 to represent the Springer season. The fourth during 29-5-2013 to represent the summer spring season. In order to specify the water quality, a group of physical and chemical analyses have bee
... Show MoreThe present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil
... Show MoreLED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show Morethis research paper aims at measuring and analyzing the influence of the stock exchange on the economic development in the Kingdom. This is done through comparing the Gross Domestic Product (GDP) as a changeable factor affiliated with some independent variables in the KSA stock exchange. These variables are (All Share Index {TASI}, Market Value, Trade Volume Index, number of companies and number of shares). The study covers the period from 2003 to 2017 and adapts the measuring method in analyzing this relation using the Multiple Linear Regression (Stepwise) and (SPSS). The study affirmed the validity of the
... Show MoreIn this study, an analysis of the synoptic characteristics, causes and mechanisms of Kahlaa tornado event was carried out. This tornado occurred on 10:30 UTC (1:30 pm Iraq Local Time) on 14 April 2016 to the north of Kahlaa town in Maysan governorate. We analyzed surface and upper charts, weather conditions, the damage indices, the dynamical features and the instability of the tornado. The analysis showed that there was a low pressure system which was an extension of the Monsoon low in addition to a supercell thunderstorm and a jet stream aloft. The cold trough and high relative vorticity at 500 hPa level, the humid warm wind blowing from the south and the dry cold wind from the north contributed to the initiation of the tornado. Accordi
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreEssential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represen
... Show More