Preferred Language
Articles
/
joe-785
Comparison of Single and Group Bored Piles Settlement Based on Field Test and Theoretical Methods
...Show More Authors

 Bored piles settlement behavior under vertical loaded is the main factor that affects the design requirements of single or group of piles in soft soils. The estimation of bored pile settlement is a complicated problem because it depends upon many factors which may include ground conditions, validation of bored pile design method through testing and validation of theoretical or numerical prediction of the settlement value. In this study, a prototype single and bored pile group model of arrangement (1*1, 1*2 and 2*2) for total length to diameter ratios (L/D) is 13.33 and clear spacing three times of diameter, subjected to vertical axial loads. The bored piles model used for the test was 2000 mm in length, and 150 mm in diameter has been constructed in soft clayey soils.  Furthermore, different theoretical methods have been used for the estimation of bored pile settlement, such as Poulos and Vesic's methods and then their comparison with the pile load test data based on the quick pile load test as presented in (ASTM-D1143, 2007).   In general, the theoretical method for estimation the bored pile settlement by Poulos and Vesic's gives higher value of the settlement for the single and group bored pile compared to the pile settlement results obtained from field pile load test data. Therefore, it is not recommended to be used for soft clayey soils. On the other hand, Hansen’s 90% and Butler and Hoy’s results may be considered reliable interpretation method to compute the settlement of single and group bored pile.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
COMPARATIVE STUDY BETWEEN A NOVEL DETERMINISTIC TEST FOR MERSENNE PRIMES AND THE WELL-KNOWN PRIMALITY TESTS
...Show More Authors

In this article, a new deterministic primality test for Mersenne primes is presented. It also includes a comparative study between well-known primality tests in order to identify the best test. Moreover, new modifications are suggested in order to eliminate pseudoprimes. The study covers random primes such as Mersenne primes and Proth primes. Finally, these tests are arranged from the best to the worst according to strength, speed, and effectiveness based on the results obtained through programs prepared and operated by Mathematica, and the results are presented through tables and graphs.

View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Meta Gene
Interleukin-1 single nucleotide polymorphisms and risk of systemic lupus erythematosus among Iraqi patients
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jul 24 2023
Journal Name
Research Journal Of Pharmacy And Technology
Comparison of the effects of Methotrexate and Etanercept on RANKL and OPG as Bone Metabolism Biomarkers in patients with Rheumatoid Arthritis
...Show More Authors

Rheumatoid arthritis is an autoimmune diseasecharacterized by chronic inflammationthat affects joints and cartilage. Bone complications such asRA-relatedosteoporosis are one of the most extra-articular manifestations. Many inflammatory mediators are released during RA disease pathophysiology; these mediators stimulate osteoclast genesis of bone by direct effects on RANKL and OPG. The study aimedto measure RANKL, OPG in RA patients treated with Etanercept only and other groups treated with Methotrexate onlyat baseline and after three months to evaluate bone state. An observational case-control prospective study was done on 30 RA patients who received MTX, 30 RA patients who received ETN, and 30 healthy,age-matched control groups. The

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Study the Effect of Multilayer Single Point Incremental Forming on Residual Stresses for Bottom Plates
...Show More Authors

Abstract

 

Knowing the amount of residual stresses and find technological solutions to minimize and control them during the production operation are an important task because great levels of deformation which occurs in single point incremental forming (SPIF), this induce highly non-uniform residual stresses. In this papera propose of a method for multilayer single point incremental forming with change in thickness of the top plate (0.5, 0.7, 0.9) mm and lubrication or material between two plates(polymer, grease, grease with graphite, mos2) to knowing an effect of this method  and parameters on residual stresses for the bottom plates. Also compare these results for the

... Show More
View Publication Preview PDF
Crossref