The study focused on explaining urban expansion and sustainable development of urban land and explaining the role of population expansion in Al Hillah city, Al Hillah city in the center of Babylion Governorate located. The study relied on analyzing the population data of the city of Al Hillah for a period of time (22 years) for the period (2000-2022). This data was analyzed and its role in planning and designing residential areas and neighborhoods in the Al Hillah city was analyzed based on the standards of urban planning and sustainable growth of cities. Landsat 5TM was used in the investigation, Landsat 8OLI satellite data to retrieve the NDVI, NDBI, and NDWI. The findings showed that between 2000 and 2022, urban and population growth increased, and the gradual disappearance of green lands and agricultural during these years as a result of poor planning, and this will lead to the elimination of green and agricultural areas. Urban areas are established quickly, as population pressure leads to the elimination of agricultural lands, In addition to the high temperatures, which led to changing livelihoods, affecting green lands as well, and increasing urban expansion at high rates. The recent results are useful for planning, management and sustainable development of the urban areas. There was a pressing need to make the right choice in this situation, and while it didn’t help to solve the full issue, it did help to address a significant portion of it by rerouting this growth and arranging it away from agricultural regions in order to protect future generations.
In this study, simply supported reinforced concrete (RC) beams were analyzed using the Extended Finite Element Method (XFEM). This is a powerful method that is used for the treatment of discontinuities resulting from the fracture process and crack propagation in concrete. The mesoscale is used in modeling concrete as a two-phasic material of coarse aggregate and cement mortar. Air voids in the cement paste will also be modeled. The coarse aggregate used in the casting of these beams is a rounded aggregate consisting of different maximum sizes. The maximum size is 25 mm in the first model, and in the second model, the maximum size is 20 mm. The compressive strength used in these beams is equal to 26 MPa.
The subje
... Show MoreAbstract
This research was to provide a definition of quality, dimensions and concepts, whether traditional or modern concept, as well as review the dimensions of quality in higher education and vision and mission with the overall objectives of the Statistics Department.
After reviewing quality goals and purposes achieved as well as the mechanisms used to achieve them. and use standard Six-Sigma as one of the methodologies used in quality with the historical roots of using this methodology and methods applied and their definitions t
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreIn this paper, the ability of using corn leaves as low-cost natural biowaste adsorbent material for the removal of Indigo Carmen (IC) dye was studied. Batch mode system was used to study several parameters such as, contact time (4 days), concentration of dye (10-50) ppm, adsorbent dosage (0.05-0.25) gram, pH (2-12) and temperature (30-60) oC. The corn leaf was characterized by Fourier-transform infrared spectroscopy device before and after the adsorption process of the IC dye and scanning electron microscope device was used to find the morphology of the adsorbent material. The experimental data was imputing with several isotherms where it fits with Freundlich (R2 = 0.9937) and followed pseudo second order kinetic. The hi
... Show MoreWe present a reliable algorithm for solving, homogeneous or inhomogeneous, nonlinear ordinary delay differential equations with initial conditions. The form of the solution is calculated as a series with easily computable components. Four examples are considered for the numerical illustrations of this method. The results reveal that the semi analytic iterative method (SAIM) is very effective, simple and very close to the exact solution demonstrate reliability and efficiency of this method for such problems.
The study deals with reactivity insertion linear and non linear and/or Ramp reactivity expressed as a polynomial in time in the presence of two Feedback mechanisms, using the neutronic-thermohydraulic coupling in order to predict the neutron behavior as a function of time in terms of reactor power. Also, a comparative study has been achieved in the case of the presence of the feedback mechanisms. Insertion of Ramp reactivities in terms of polynomial in time to study the behavior of power and reactivity as a function of time in the presence of two feedback mechanisms (fuel and coolant) has been carried out and the results are displayed as plots, and showed this results corresponding with international results. The present study shows t
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More