In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibility of the beam caused by crack is modeled depending on a dimensionless parameter identified from finite elements method. Different piezoelectric patches were designed and investigated using analytical and finite elements models. The results show that increasing the patch thickness enhances the beam resistance to crack and load effects, while increasing the length of the piezoelectric patch reduces the magnitude of the voltage required to repair the cracked beam.
The building of Basrah University located in a rural area at Gramat Ali, its consist of seven colleges and very high number of students, lecturers ,and employers. Therefore, the intersections which leading to university building suffer congestion at morning peak hour (8-9) A.M and evening peak hour (2-3) P.M. In this study we collected the data in intersections which leading to university building at peak hour at same time, then we had analysis this data by using the highway capacity manual (HCM) and program (HCS). Also, we collected that data in University entries with classification of vehicles according to types and number of passengers at peak hour. Then we studied the number of proposals to riddance the congestion, such as the effe
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MorePurpose: The main objective of this paper is, to determine the optimal no. of technicians’ men in a workshop crew of an Industrial System. Theoretical framework: The purpose of applying these tools is to explore their ability to reduce costs and improvements that can be obtained in the process of providing services to the end customer. Design/methodology/approach: The literature structure review was built from analyzing 12 of scientific papers and books, from web sciences and the Elsevier database. The papers were analyzed from descriptive, methodologic, and citation characteristics. Finding: By applying the equation model of the paper, the optimal no. of technician men in the crew of the workshop can be determined when
... Show MoreVaried uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreTrajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of
... Show MoreThe main objective of this research is to find the coefficient of permeability (k) of the soil and especially clayey soil by finding the degree of consolidation (rate of consolidation). New modify procedure is proposed by using the odometer (consolidation) device. The ordinary conventional permeability test usually takes a long time by preparing and by testing and this could cause some problems especially if there is a need to do a large number of this test and there were a limited number of technicians and/or apparatus. From this point of view the importance of this research is clear, since the modified procedure will require a time of 25 minute only. Derivation made to produce an equation which could be used to fined the permeabi
... Show MoreObjectives: To assess the qualifications and performance of newly graduated pharmacists and explore factors that affect their performance in public hospitals. Methods: This qualitative study included face-to-face, semi-structured interviews with hospital practitioner pharmacists. It was conducted between March and May 2023 in Kerbala province, Iraq. The participating pharmacists were selected purposefully because they had three or more years of work experience at governmental hospitals. The audio-recording interviews were transcribed. Thematic analyses were used to generate themes and subthemes from the interviews. Results: Twenty-seven hospital pharmacists participated in this study. The study found that there are several factors t
... Show MoreLet A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.