The settlement rate and pore water pressure dissipation rate are mainly controlled by the permeability of soil. Both laboratory and field tests show that the permeability is varied during the loading and consolidation process. It is known that consolidation process is accompanied by decrease in void ratio which leads to decrease in the coefficient of permeability. The importance of the decrease of the coefficient of permeability on the time rate of settlement and pore water pressure needs to be investigated.
This paper takes into account the change in coefficient of permeability during consolidation and studies its effect on consolidation characteristics of a clay layer. The finite element method is used in the analysis and the package Geo-Slope is adopted through coupling the programs SIGMA/W and SEEP/W. The relationship between the applied pressure and permeability was determined experimentally for three samples.
It was concluded that the effect of permeability is clear at later times of consolidation due to decrease in void ratio and hence slower dissipation of pore water pressure. Taking into account variable permeability leads to longer times of consolidation. At later times (after 400 days), the excess pore water pressure predicted for the case of variable permeability is greater than
conventional case by about (10 – 12) %.
Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreBuzurgan oil Field which is located in south of Iraq has been producing oil for five decades that caused production to drop in many oil wells. This paper provides a technical and economical comparison between the ESP and gas lift in one oil well (Bu-16) to help enhancing production and maximize revenue. Prosper software was used to build, match and design the artificial lift method for the selected well, also to predict the well behavior at different water cut values and its effect on artificial lift method efficiency. The validity of software model was confirmed by matching, where the error difference value between actual and calculated data was (-1.77%).
The ESP results showed the durability of ESP regarding th
... Show MoreEnvironmental Control Systems form one of the integral tasks of the designer, resulting from his/her acquaintance with the nature of sites and the way they are deployed to achieve modern space entity which is witnessing significant development in the field of interior design.Good deployment of these systems offer us, as designers, high potential and several varied solutions to configure internal spaces characterised as a fertile field of study and knowledge.The research problem was identified in the marginalisation of the importance of Environmental Control Systems as an important designing factor to achieve integrated design. The research problem was demonstrated in Chapter One, along with defining the objectives and formulating
The human being is a social being and human communication is a fundamental axis in the process of social interaction, and the characteristic of social shyness grows through the interaction of the individual with his environment. Identifying the level of shyness among university students, and identifying the differences in shyness among university students according to specialization (scientific, humanities). In order to achieve the objectives of the research, the researcher prepared a measure of shyness based on Zimbardo's theory, and the components that he identified are the (behavioral, cognitive, and emotional components). The validity and reliability were calculated using the Cronbach's alpha method, reaching (0.94), and the scale in
... Show MoreIn This paper, we have been approximated Grűnwald-Letnikov Derivative of a function having m continuous derivatives by Bernstein Chlodowsky polynomials with proving its best approximation. As well as we have been solved Bagley-Torvik equation and Fokker–Planck equation where the derivative is in Grűnwald-Letnikov sense.
Abstract
The research was limited to those whom Imam Abu Dawood
described in his Sunan as weak, so this research does not include
narrators who carried descriptions indicating weakness such as
ignorance or others, nor does it include hadiths that the Imam
described as weak.
The number of narrators whom Imam Abu Dawood described as
weak has reached six narrators, and my methodology was to
mention the words of Imam Abu Dawood, then transfer the
sayings of other advanced scholars, as well as the sayings of
Imam Abu Dawood in his other books, if any, to show the extent
of compatibility between these sayings.
I have reached the following resul
... Show More