Preferred Language
Articles
/
RoY9qYYBIXToZYALpaPx
Finite Element Analysis of Concrete Beam under Flexural Stresses Using Meso-Scale Model
...Show More Authors

Two dimensional meso-scale concrete modeling was used in finite element analysis of plain concrete beam subjected to bending. The plane stress 4-noded quadrilateral elements were utilized to model coarse aggregate, cement mortar. The effect of aggregate fraction distribution, and pores percent of the total area – resulting from air voids entrapped in concrete during placement on the behavior of plain concrete beam in flexural was detected. Aggregate size fractions were randomly distributed across the profile area of the beam. Extended Finite Element Method (XFEM) was employed to treat the discontinuities problems result from double phases of concrete and cracking that faced during the finite element analysis of concrete beam. Cracking was initiated at a small notch located at the middle of the bottom face of the concrete beam. The response of plain concrete beam subjected to pure bending via two point load application was detected using (XFEM) analysis of meso-scale concrete model. Assuming full bond between aggregate particles, and mortar at interfacial zone, the flexural strength of plain concrete beam is increased when aggregate particles size is increased, so that bending and shear stress were affected by void percentage and aggregate particles distribution. The maximum deflection at midspan was increased when the aggregate particles size decreases.

Clarivate Crossref
Publication Date
Sun Dec 19 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST PHOTOGRAPHIC RECORDS AND NEW DISTRIBUTION RANGE OF THE ENDANGERED LONG-TAILED NESOKIA NESOKIA BUNNII (KHAJURIA, 1981)
...Show More Authors

In the 1970s, the world knew the long-tailed nesokia Nesokia bunnii (Khajuria, 1981) (Rodentia, Muridae) from the Mesopotamian marshes of Garden of Eden in Southern Iraq. This distinct rodent was known from only five voucher specimens collected at the confluence of Tigris and Euphrates Rivers in southern Iraq while its occurrence in Southwestern Iran had
never been reported. In the 1990s, a large extent of its natural habitat was catastrophically desiccated and the animal was last seen in the 1970s. Since then, the status of this elusive rodent was shrouded in mystery. In 2007, an extraordinary photograph of a carcass of this species came to the light from Hawizeh Marsh which was interpreted as concrete evidence of the species’ pers

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Supply Chain Management
The impact of the supply chain strategy on accounting social responsibility to assess financial performance in Iraq
...Show More Authors

Social responsibility has achieved tremendous attention by academicians and practitioners to focus on social responsibility accounting. However, many studies around the globe have been conduct to measure the outcomes of social responsibility accounting. This paper presents the impact of applying the supply chain strategy (SCS) on the agribusiness field to optimize productivity and decreasing cost which will have a direct impact on the net income of the organization. The inconclusive results of earlier studies stimulated this research to social responsibility accounting-financial performance. The equivocal results of this phenomenon urge this study to investigate the role of other factors in the relationship of social responsibility accounti

... Show More
Scopus (1)
Scopus
Publication Date
Mon Aug 16 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Statistic Assessment of Spreading Cases (Total Confirmed, Recovered, Death) From Different AreasContain Novel Coronavirus (2019-n Cov)
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Reviews In Medical Microbiology
Expression of virulence and antimicrobial resistance genes among Escherichia coli clinical isolates from blood and stool samples
...Show More Authors
Objective:

As major nosocomial pathogens, Escherichia coli isolates exhibit antibiotic resistance and also express adhesive structures and antibiotic resistance genes. The objective of this study was the comparison of virulence gene expression of extended-spectrum beta-lactamase (ESBL)-producing E. coli between blood and stool samples.

Methods:

In this study, 20 E. coli clinical isolates (10 ESBL-producers including 5 from blood, 5 from stool sample

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jun 04 2023
Journal Name
Iraqi Journal Of Biotechnology,
Gene Expression of Adenosine Deaminase Genes 1 and 2 in Female Iraqi Patients with Autoimmune Thyroid Disease
...Show More Authors

The current study was carried out to investigate the correlation of gene expressions of ADA1 and ADA2 genes with the development of autoimmune thyroid disease (AITD) in a sample of Iraqi females. One hundred patients with AITD and 80 controls were included. Quantitative real time polymerase chain reaction (qRT–PCR) was utilized for investigation of ADA1 and ADA2 gene expression among patients and controls. The correlation of age and body mass index (BMI) with AITD occurrence comparing with controls was studied. Based on the results of this study, there is high expression level of ADA1 and ADA2 genes in patients compared with healthy controls; also, the gene expression fold (2-ΔΔCT) of ADA1 and ADA2 among AITD patients was recorded and a

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Aes-atema International Conference Series - Advances And Trends In Engineering Materials And Their Applications,
Back filler friction spot welding of pure commercial copper sheets to AA1050 aluminum alloy sheets (experimental study)
...Show More Authors

""

Scopus (1)
Scopus
Publication Date
Wed Nov 01 2023
Journal Name
Case Studies In Thermal Engineering
Augmenting the thermal response of helical coil latent-heat storage systems with a central return tube configuration
...Show More Authors

Low-temperature stratification, high-volumetric storage capacity, and less-complicated material processing make phase-changing materials (PCMs) very suitable candidates for solar energy storage applications. However, their poor heat diffusivities and suboptimal containment designs severely limit their decent storage capabilities. In these systems, the arrangement of tubes conveying the heat transport fluid (HTF) plays a crucial role in heat communication between the PCM and HTF during phase transition. This study investigates a helical coil tube-and-shell thermal storage system integrated with a novel central return tube to enhance heat transfer effectiveness. Three-dimensional computational fluid dynamics simulations compare the proposed d

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of College Of Education
The Construction of Complete (k, n)-arcs in 3-Dimensional Projective Space Over Galois Field GF (4)
...Show More Authors

In this work, we construct the projectively distinct (k, n)-arcs in PG (3, 4) over Galois field GF (4), where k 5, and we found that the complete (k, n)-arcs, where 3 n 21, moreover we prove geometrically that the maximum complete (k, n)-arc in PG (3, 4) is (85, 21)-arc. A (k, n)-arcs is a set of k points no n+ 1 of which are collinear. A (k, n)-arcs is complete if it is not contained in a (k+ 1, n)-arcs

Publication Date
Mon Mar 31 2025
Journal Name
The Iraqi Geological Journal
Evaluation of Machine Learning Techniques for Missing Well Log Data in Buzurgan Oil Field: A Case Study
...Show More Authors

The investigation of machine learning techniques for addressing missing well-log data has garnered considerable interest recently, especially as the oil and gas sector pursues novel approaches to improve data interpretation and reservoir characterization. Conversely, for wells that have been in operation for several years, conventional measurement techniques frequently encounter challenges related to availability, including the lack of well-log data, cost considerations, and precision issues. This study's objective is to enhance reservoir characterization by automating well-log creation using machine-learning techniques. Among the methods are multi-resolution graph-based clustering and the similarity threshold method. By using cutti

... Show More
View Publication Preview PDF
Scopus Crossref