Preferred Language
Articles
/
9oYnsoYBIXToZYALarAR
Flexural Moment Capacity Evaluation of Reinforced RPC Two-way Slabs
...Show More Authors

The aim of this paper is to determine the flexural moment capacity of Reactive Powder Concrete (RPC) two-way slabs based on three models proposed by previous studies (Model 1, Model 2, and Model 3). The results obtained from these models were compared with those obtained from experimental work to check the accuracy and the applicability of the adopted theoretical models. The experimental program included the testing of three simply supported RPC two-way slabs (1000x1000x70) mm each. The tested specimens had identical properties except their steel fibres volume ratios (0.5 %, 1 %, and 1.5 %). The comparison with the experimental data showed that (Model 3) is the most suitable one among the three models. Model 1 was found to underestimate the failure load, and Model 2 was found to overestimate it. The maximum differences between the theoretical and experimental failure loads obtained from Model 1, Model 2, and Model 3 were 55.2% 87.2%, and 3.4%, respectively.

Crossref
Publication Date
Tue Jan 28 2014
Journal Name
Journal Of Energy And Power Engineering
Comparison between Two Vertical Enclosures Filled With Porous Media under the Effect of Radiation and Magnetohydrodynamics
...Show More Authors

View Publication
Crossref
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Study of Laser Propagation Parameters in the Underdense Plasma Region Using a Two Dimensional Simulation Code
...Show More Authors

The propagation of laser beam in the underdense deuterium plasma has been studied via computer simulation using the fluid model. An appropriate computer code “HEATER” has been modified and is used for this purpose. The propagation is taken to be in a cylindrical symmetric medium. Different laser wavelengths (1 = 10.6 m, 2 = 1.06 m, and 3 = 0.53 m) with a Gaussian pulse type and 15 ns pulse widths have been considered. Absorption energy and laser flux have been calculated for different plasma and laser parameters. The absorbed laser energy showed maximum for  = 0.53 m. This high absorbitivity was inferred to the effect of the pondermotive force.

View Publication Preview PDF
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Optimizing the Secure Key Rate of a Single Sequential Quantum Repeater with Two Different Quantum Memories
...Show More Authors

Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.

View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Electric Power Systems Research
Analytical and measurement-based wideband two-port modeling of DC-DC converters for electromagnetic transient studies
...Show More Authors

Power-electronic converters are essential elements for the effective interconnection of renewable energy sources to the power grid, as well as to include energy storage units, vehicle charging stations, microgrids, etc. Converter models that provide an accurate representation of their wideband operation and interconnection with other active and passive grid components and systems are necessary for reliable steady state and transient analyses during normal or abnormal grid operating conditions. This paper introduces two Laplace domain-based approaches to model buck and boost DC-DC converters for electromagnetic transient studies. The first approach is an analytical one, where the converter is represented by a two-port admittance model via mo

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Aip Conference Proceedings
Analysis of performance measures with single channel fuzzy queues under two class by using ranking method
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2001
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SURVEY ON THE PREVALENCE OF INTESTINAL PARASITES AMONG ORPHAN CHILDREN INHABIT TWO STATEHOMES IN BAGHDAD CITY
...Show More Authors

230 stool samples were collected from 2 state homes for (males and females) to investigate
the infection of different intestinal parasites (pathogenic and non-pathogenic).
The infection rate was higher among males 15.7% than females 6%, these rates were
increased when concentration method was employed up to 54.8% for males and 8.7% for
females significantly.
Most infected orphans were found to harbor single parasite followed by double, triple
parasites.
The highest rate of infection was found among young age group (1-5) years old, while
the older age groups got lowest rates.
Of helminthes, the commonest parasite was Hymenolepis nana 5.7% and of protozoa, the
commonest intestinal parasite was Giardia lamblia

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Comparative sensitivity of two freshwater snail Melanopsis nodosa and Bulinus truncatus to 2, 4-D pesticide
...Show More Authors

The molluscicidal effects of herbicide 2, 4-D were studied against tow species of freshwater snail Bulinus truncatus and Melanopsis nodosa by short term experiments. Calculated values of lethal concentrations (LC50 and LC100) were maid to two spices for different period of time 24hr, 48hr, 72hr and 96hr. The study had showed that the herbicide 2, 4-D was toxic against the tow species. The toxicity of the herbicide was low or unknown in low concentrations in the first period of exposure 24and 48hr to two spices but it increase gradually with increase period of exposure. The spice of B.truncatus was more tolerant than the M.nodosa. All the individual of M nodosa was death while in B.truncatus the complete death was not appear until finish the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 08 2022
Journal Name
Al-kindy College Medical Journal
Two Decades in the Journey of Al-Kindy College Medical Journal: Key Barriers, Achievements, and Prospects
...Show More Authors

Apart from graduating five-star doctors, a particular medical college has the mission to motivate and offer researchers the opportunity to publish high-quality researches on various health problems and disseminate updated medical knowledge to a wide range of local and international readers. This could be accomplished by establishing a medical journal and releasing issues regularly

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of Thi – Qar Science
Enhanced of the Two photon Absorption in Nanostructure Wide Band gap Semiconductor CdS using femtosecond Laser
...Show More Authors

We observed strong nonlinear absorption in the CdS nanoparticles of dimension in the range 50-100 nm when irradiant with femtosecond pulsed laser at 800 nm and 120 GW/cm 2 irradiance intensity. The repetition rate and average power were 250 kHz and

View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (16)
Scopus Crossref