Fiber‐reinforced elastic laminated composites are extensively used in several domains owing to their high specific stiffness and strength and low specific density. Several studies were performed to ascertain the factors that affect the composite plates’ dynamic properties. This study aims to derive a mathematical model for the dynamic response of the processed composite material in the form of an annular circular shape made of polyester/E‐glass composite. The mathematical model was developed based on modified classical annular circular plate theory under dynamic loading, and all its formulas were solved using MATLAB 2023. The mathematical model was also verified with real experimental work involving the vibration test of the fabricated composite plate. The composite plate was processed by reinforcing the polyester matrix with E‐glass fibers with a 50% volume fraction each by using the handy lay‐up method. After fabrication, the composite plate was tested with a universal vibration tester, where the plate was impacted and released to free vibration, and the deflection was measured experimentally to compare it with the theoretical value calculated from the derived model. The plate was tested under two boundary conditions, namely, simply and built‐in supported. The findings show good agreement between theoretical and experimental plate deflections at different angles, particularly at built‐in supported boundary conditions. Also, a higher natural frequency was recorded at this condition compared to others, and this may be ascribed to the higher shear stresses involved due to large moments at the ends along with supporting. Meanwhile, the real experimental spectrum of the built‐in condition was higher than others, as the sig view curve revealed.
The researches to discover useful ways to represent the agents and agent-based
systems are continuous. Unified Modeling Language (UML) is a visual modeling language
used for software and non software modeling systems. The aim of this paper is: using UML
class diagram to design treasury pharmaceuticals agent and explain its internal action. The
diagram explains the movement of the agent among other nodes to achieve user's requests
(external) after it takes them. The paper shows that it is easy to model the practical systems by
using agent UML when they are used in a complex environment.
The Planning and Resource Development Department of the Iraqi Ministry of Health is very interested in improving medical care, health education, and village training programs. Accordingly, and through the available capabilities of the ministry, itdesires to allocate seven health centers to four villages in Baghdad, Iraq therefore the ministry needs to determine the number of health centers allocated to each of these villages which achieves the greatest degree of the overall effectiveness of the seven health centers in a fuzzy environment. The objective of this study is to use a fuzzy dynamic programming(DP) method to determine the optimal allocation of these centers, which allows the greatest overall effectiveness of these health centers
... Show MoreIraq is located near the northern tip of the Arabian plate, which is advancing northwards relative to the Eurasian plate, and is predictably, a tectonically active country. Seismic activity in Iraq increased significantly during the last decade. So structural and geotechnical engineers have been giving increasing attention to the design of buildings for earthquake resistance. Dynamic properties play a vital role in the design of structures subjected to seismic load. The main objective of this study is to prepare a data base for the dynamic properties of different soils in seismic active zones in Iraq using the results of cross hole and down hole tests. From the data base collected it has been observed that the average ve
... Show MoreThe aim of the research is to find out the effect of applying classroom assessment techniques (CATs) on both mathematical and logical thinking among fourth-grade scientific students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught in the traditional way and the other experimental taught according to the techniques of classroom structural evaluation. The research sample consisted of (44) students from the fourth scientific grade who were intentionally chosen after ensuring their equivalence in several factors, most notably chronologi-cal age and the level of mathematics, and they were distributed equally among the t
... Show MoreThe result of a developed mathematical model for predicting the design
parameters of the fiber Raman amplifier (FRA) are demonstrated. The amplification
parameters are tested at different pump power with different fiber length. Recently,
the FRA employed in optical communication system to increase the repeater distance
as will as the capacity of the communication systems. The output results show, that
high Raman gain can be achieved by high pumping power, long effective area that
need to be small for high Raman gain. High-stimulated Raman gain coefficient is
recommended for high Raman amplifier gain, the low attenuation of the pump and the
transmitted signal in the fiber lead to high Raman gain.
This research is devoted to investigating the thermal buckling analysis behaviour of laminated composite plates subjected to uniform and non-uniform temperature fields by applying an analytical model based on a refined plate theory (RPT) with five unknown independent variables. The theory accounts for the parabolic distribution of the transverse shear strains through the plate thickness and satisfies the zero-traction boundary condition on the surface without using shear correction factors; hence a shear correction factor is not required. The governing differential equations and associated boundary conditions are derived by using the virtual work principle and solved via Navier-type analytical procedure to obtain critica
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More