Preferred Language
Articles
/
ARbUH4cBVTCNdQwCCDnX
Push-out test of waste sawdust-based steel-concrete – Steel composite sections: Experimental and environmental study
...Show More Authors

Crossref
View Publication
Publication Date
Wed Nov 28 2018
Journal Name
International Journal Of Engineering & Technology
Modified Strut Effectiveness Factor for FRP-Reinforced Concrete Deep Beams
...Show More Authors

A few examinations have endeavored to assess a definitive shear quality of a fiber fortified polymer (FRP)- strengthened solid shallow shafts. Be that as it may, need data announced for examining the solid profound pillars strengthened with FRP bars. The majority of these investigations don't think about the blend of the rigidity of both FRP support and cement. This examination builds up a basic swagger adequacy factor model to evaluate the referenced issue. Two sorts of disappointment modes; concrete part and pulverizing disappointment modes were examined. Protection from corner to corner part is chiefly given by the longitudinal FRP support, steel shear fortification, and cement rigidity. The proposed model has been confirmed util

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Apr 08 1999
Journal Name
Abhath Al- Yarmouk [basic Sciences And Engineering]
Model for Predicting the Cracking Moment in Structural Concrete Members
...Show More Authors

Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Statistical Model for Predicting the Optimum Gypsum Content in Concrete
...Show More Authors

The problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 27 2021
Journal Name
International Conference On Fibre-reinforced Polymer (frp) Composites In Civil Engineering
Hybrid Anchors in Reinforced Concrete Slabs Strengthened with FRP Sheets
...Show More Authors

Reinforced concrete (RC) slabs strengthened with carbon fibre reinforced polymer (CFRP) and subjected to flexural actions may experience many types of failure, including FRP debonding, FRP rupture and concrete crushing. Of these different types of failure modes, FRP debonding stands out as the most predominant type of failure because of its dependence on the relatively weak bond interface between the soffit of the RC member and the FRP sheet attached to it. Many anchorage systems have been developed to enhance the performance of strengthened systems, one of which is the hybrid anchor, which combines the effects of patch anchors and spike anchors. Hybrid anchors have shown significant enhancement when used with RC members subjected to shear

... Show More
View Publication
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Inorganic Chemistry Communications
Entrapment of polyethylene terephthalate derived carbon in Ca-alginate beads for solid phase extraction of polycyclic aromatic hydrocarbons from environmental water samples
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Res Militaris
The Impact of the different methods of Selecting One Group in Calculating the Items Sensitivity Coefficient on the Standard Characteristics of the Criterion-Referenced Test
...Show More Authors

AbstractThe research aims to identify the impact of the different methods in calculating the Items sensitivity coefficient on the standard characteristics of the Criterion-Referenced test in the measurement and evaluation material. The research sample consisted of (35) male and female students, who were chosen by the intentional method. The researcher prepared learning-teaching program in constructing the content of the measurement and evaluation material for non-specialized departments, prepared an achievement test in its equivalent forms, identified the results of agreement between the methods used in analyzing the items of the criterion-referenced test, and compared the standard characteristics of the achievement test, both according to

... Show More
Preview PDF
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref