Preferred Language
Articles
/
joe-2983
RELIABILITY ANALYSIS OF THE SEISMIC STABILITY OF EMBANKMENTS REINFORCED WITH STONE COLUMNS
...Show More Authors

Geotechnical engineers have always been concerned with the stabilization of slopes. For this purpose,
various methods such as retaining walls, piles, and geosynthetics may be used to increase the safety factor of slopes prone to failure. The application of stone columns may also be another potential alternative for slope stabilization. Such columns have normally been used for cohesive soil improvement. Most slope analysis and design is based on deterministic approach i.e a set of single valued design parameter are adopted and a set of single valued factor of safety (FOS) is determined. Usually the FOS is selected in view of the understanding and knowledge of the material parameters, the problem geometry, the method of analysis and the consequences of failure. This results in different FOS obtained by different designers. This inherent variability characteristic dictates that slope stability problem is a probabilistic problem rather than deterministic problem. Furthermore, the FOS approach cannot quantify the probability of failure or level of risk associated with a particular design situation. The objective of this study is to integrate probabilistic approach as a rational means to incorporate uncertainty in the slope stability analysis. The study was made through a hypothetical problem which includes a sensitivity analysis. The methodology is based on Monte Carlo simulation integrated in commercially available computer program SLOPE/W. The output of the analysis is presented as the probability of failure as a measure of the likelihood of the slope failure. Results of this study have verified that the probability of failure is a better measure of slope stability as compared to the factor of safety because it provides a range of value rather than a single value.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Sources of the Narrative of Siffin Agreement
...Show More Authors

We can conclude that version A is substantially genuine while version B is spurious. an Attempt has been made above to show relevance of this to our understanding of the agreement itself .
The central issue of sunna to which recourse was to be had must of course be connected with development of the meaning of the word sunna from the broader (way of Proceeding ) and (generally agreed practice).
Any sweeping judgements about the invalidity of reports transmitted by shiis or supposed shii are out of place. theestablishment of realistic criteria for the appreciation of early sources for Islamic history is subject which is still in Its infancy

View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
Foresight of the development of the housing sector
...Show More Authors

The housing sector in Iraq has suffered from multiple problems, the most prominent of which is the failure of the housing market to achieve housing production that faces population increases and a high number of households.

The research aims to foresight the future of the housing sector,  and to identify the expectations of experts in the development of the housing sector and housing production, in order to overcome the obstacles and problems.

Foresight does not mean forecasting about future events, but rather it is a process and skill aimed at familiarity with providing sufficient knowledge to achieve the desired future goals, Accordingly, adopting a method of future foresight will reduce error,  surprise and s

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
Journal Of Pioneering Medical Science
Nurses' Perception Toward Therapeutic Strategies for Children with Pneumonia
...Show More Authors

Background: Pneumonia is the common lower respiratory tract infection among pediatrics, especially under five; it is a common cause of under-five children morbidity and mortality. Objectives of study: To identify nurses' perceptions toward therapeutic strategies for children with pneumonia and to find the association between their perceptions and their demographic variables. Methods: A Convenient sample of 46 nurses in Baghdad city from three hospitals) Kadhimiya Hospital for Children, Central Teaching Hospital of Pediatrics, and Child Welfare Teaching Hospital) included in the study to identify their perceptions regarding pneumonia in children. Results: The results of the study present that most of the nurses' participants in the a

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
On Skew Left n-Derivations with Lie Ideal Structure
...Show More Authors

In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and  the commutativity of Lie ideal under certain conditions were proved.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Iraqi Postgraduate Medical Journal
Angiolymphoid hyperplasia with eosinophilia (pseudopyogenic granuloma) among Iraqi patients
...Show More Authors

KE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1

View Publication
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Improve Data Mining Techniques with a High-Performance Cluster
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Compared to wireless deployment in areas with different environmentse
...Show More Authors

<p>In the mobile phone system, it is highly desirable to estimate the loss of the track not only to improve performance but also to achieve an accurate estimate of financial feasibility; the inaccurate estimate of track loss either leads to performance degradation or increased cost. Various models have been introduced to accurately estimate the path loss. One of these models is the Okomura / Hata model, which is recommended for estimating path loss in cellular systems that use micro cells. This system is suitable for use in a variety of environments. This study examines the comparison of path loss models for statistical analysis derived from experimental data collected in urban and suburban areas at frequencies of 150-1500 MHz

... Show More
View Publication
Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Secure Wireless Communications in Broadcast Channels With Confidential Messages
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref