Multi-belled piles are piles with enlarged ends; these piles have one or further bells at the lower third part of the pile. These piles are suitable for many soils with problems such as softening clay, the variation of groundwater table, expansive soils, black cotton soil, and loose sand. The current study reviewed the behavior of belled piles in multi-layer soils subjected to axial compression and pullout loading. The review covered the experimental and theoretical works on belled piles in multi-layered soils. These piles were subjected to static and dynamic loadings in compression and pullout cases. Most theoretical results focused on software such as PLAXIS 3D. The axial load applied on the piles comes from the upper structure built above these piles, and negative skin friction comes from groundwater. The results obtained from previous studies showed the validity of using such piles in different types of soil and multilayer soils. According to previous studies, this study aims to find all the things about the belled piles, including the best shape of the belled pile being the half cone and the worst state being when the bell is fully cone. The best number of belled piles is two bells because the bearing capacity increases when the number of bells increases but does not exceed two due to hard work and high cost. The best location of a bell is at the base of the pile. The current study showed that the bearing capacity increased from 40% to 73.75% compared with ordinary piles.
In all applications and specially in real time applications, image processing and compression plays in modern life a very important part in both storage and transmission over internet for example, but finding orthogonal matrices as a filter or transform in different sizes is very complex and importance to using in different applications like image processing and communications systems, at present, new method to find orthogonal matrices as transform filter then used for Mixed Transforms Generated by using a technique so-called Tensor Product based for Data Processing, these techniques are developed and utilized. Our aims at this paper are to evaluate and analyze this new mixed technique in Image Compression using the Discrete Wavelet Transfo
... Show MoreBecause of the new political stage that Iraq is living in, which called on researchers to choose the subject of political marketing and increase its effectiveness through strategic intuition. The problem of research was reflected in the following question: How can strategic intuition be used to achieve efficiency in marketing marketing to achieve voter acceptance and achieve political success later on? ).
The research derives its importance from the fact that it is related to the developments in the concepts and areas of marketing in various fields, and it has a role in identifying the gain of new markets, where it is specialized to provide a political product and identify the mechanism of marketing the p
... Show MoreA number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreAim: This study aimed to investigate the impact of rabbit serum on skin wound healing with the help of histological examination. Materials and Methods: A total of ten indigenous rabbits were used in this study. The animals were divided into two groups: control and serum- treated. The histological assessment was done with a paraffin embedding technique and the histological sections were stained with H&E stain. Results: Severe infiltration of polymorphonuclear leukocytes with severe fibrin deposits were seen in serum treated group at 2 days post-injury; at 7 days post-injury the changes revealed moderate fibroplasia, fibrin deposit and severe infiltration of both mononuclear and polymorphonuclear leukocytes; at 14 days post-inju
... Show MoreEleven hymenopterous species: two braconids, seven eulophids and two pteromalids
parasitized the larvae of Phytomyza horticola Goureau. The activity of the parasites began at
the end of April and evidently increased during May. The female of the parasites fed and
parasitized mostly on the second and third larval instars of P. horticola . Diglyphus iseae
Walker and Cirrospilus vittatus Walker were dominant larval parasites. Chrysocharis
pentheus Walker and Pediobius acantha Walker were main pupal parasites.
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreWastewater recycling for non-potable uses has gained significant attention to mitigate the high pressure on freshwater resources. This requires using a sustainable technique to treat natural municipal wastewater as an alternative to conventional methods, especially in arid and semi-arid rural areas. One of the promising techniques applied to satisfy the objective of wastewater reuse is the constructed wetlands (CWs) which have been used extensively in most countries worldwide through the last decades. The present study introduces a significant review of the definition, classification, and components of CWs, identifying the mechanisms controlling the removal process within such units. Vertical, horizontal, and hybrid CWs
... Show More