In this paper, a methodology is presented for determining the stress and strain in structural concrete sections, also, for estimating the ultimate combination of axial forces and bending moments that produce failure. The structural concrete member may have a cross-section with an arbitrary configuration, the concrete region may consist of a set of subregions having different characteristics (i.e., different grades of concretes, or initially identical, but working with different stress-strain diagrams due to the effect of indirect reinforcement or the effect of confinement, etc.). This methodology is considering the tensile strain softening and tension stiffening of concrete in additio
The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show Moreيؤدي عرض معلومات مضللة او محرفة ضمن القوائم المالية والتي تعد أهم مصادر المعلومات الموثوقة التي يُعول عليها لاتخاذ القرارات السليمة الى عدم قدرتها على عكس نتيجة النشاط والمركز المالي لها او اعمال الوحدة الاقتصادية لتلك الفترات الزمنية بصورة صادقة وعادلة نتيجة لنوعية المعلومات المفصح عنها في القوائم المالية لذلك زاد الاهتمام بتطوير الممارسات المحاسبية لتتضمن افصاحات كافية بغرض اعطائهم صورة صادقة وعادلة
... Show MoreCholesteryl ester transfer protein gene contains some single nucleotide polymorphisms, which have been associated with serum high-density lipoprotein concentration and other lipoproteins. This study is done for determining of cholesteryl ester transfer protein polymorphism and evaluate its effect on serum lipid profile concentrations in some hyperlipidemic patients compared with healthy subjects in Salah Al-din governorate-Iraq. Blood samples were taken from (90) patients suffering from hyperlipidemia, and (70) samples that were apparently healthy controls. Serum lipid concentrations were measured by enzymatic assays. The polymorphism was genotyped using polymerase chain reaction restriction fragment length polymorphism analysis.&n
... Show MoreA fixed firefighting system is a key component of fire safeguarding and reducing fire danger. It is installed as a permanent component in a structure to protect the entire or a portion of the building and its contents. The study aims to review the previous studies that deal with the evaluation of fire safety measures and their use in resolving problems associated with fire threats in buildings. For this reason, a number of previous studies in this field were reviewed compared with the NFPA code. The findings revealed that regulatory developments over the last several decades had created an atmosphere conducive to innovation. This has resulted in a growth in the number of fixed firefighting system types now obtainable. Th
... Show MoreOne of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreBACKGROUND: Diabetes Mellitus is a complex chronic illness that has increased significantly around the world and is expected to affect 628 million in 2045. Undiagnosed type 2 diabetes may affect 24% - 62% of the people with diabetes; while the prevalence of prediabetes is estimated to be 470 million cases by 2030. AIM OF STUDY: To find the percentage of undiagnosed diabetes and prediabetes in a slice of people aged ≥ 45years, and relate it with age, gender, central obesity, hypertension, and family history of diabetes. METHODS: A cross sectional study that included 712 healthy individuals living in Baghdad who accepted to take part in this study and fulfilling the inclusion and exclusion criteria.
... Show MoreDrones play a vital role in the fundamental aspects of Industry 4.0 by converting conventional warehouses into intelligent ones, particularly in the realm of barcode scanning. Various potential issues frequently arise during barcode scanning by drones, specifically when the drone camera has difficulty obtaining distinct images due to certain factors, such as distance, capturing the image whilst flying, noise in the environment and different barcode dimensions. In addressing these challenges, this study proposes an approach that combines a proportional–integral–derivative (PID) controller with image processing techniques. The PID controller is responsible for continuously monitoring the camera’s input, detecting the difference
... Show More