The finite element method has been used in this paper to investigate the behavior of precast reinforced concrete dapped-ends beams (DEBs) numerically. A parametric investigation was performed on an experimental specimen tested by a previous researcher to show the effect of numerous parameters on the strength and behavior of RC dapped-end beams. Reinforcement details and steel arrangement, the influence of concrete compressive strength, the effect of inclined load, and the effect of support settlement on the strength of dapped-ends beams are examples of such parameters. The results revealed that the dapped-end reinforcement arrangement greatly affects the behavior of dapped end beam. The failure load decreases by 25% when
... Show MoreTransforming the common normal distribution through the generated Kummer Beta model to the Kummer Beta Generalized Normal Distribution (KBGND) had been achieved. Then, estimating the distribution parameters and hazard function using the MLE method, and improving these estimations by employing the genetic algorithm. Simulation is used by assuming a number of models and different sample sizes. The main finding was that the common maximum likelihood (MLE) method is the best in estimating the parameters of the Kummer Beta Generalized Normal Distribution (KBGND) compared to the common maximum likelihood according to Mean Squares Error (MSE) and Mean squares Error Integral (IMSE) criteria in estimating the hazard function. While the pr
... Show MoreSince June 2020, an explosion in number of new COVID-19 patients has been reported in Iraq with a steady increment in new daily reported cases over the next 3 months. The limited number of PCR kits in the country and the increment in the number of new COVID-19 cases makes the role of CT scan examinations rising and becoming essential in aiding the health institutions in diagnosing and isolating infected patients and those in close contacts. This study will review the spectrum of CT pulmonary changes due to COVID-19 infection and estimate the CT severity score index and its relation to age, sex, and PCR test results
Reservoir permeability plays a crucial role in characterizing reservoirs and predicting the present and future production of hydrocarbon reservoirs. Data logging is a good tool for assessing the entire oil well section's continuous permeability curve. Nuclear magnetic resonance logging measurements are minimally influenced by lithology and offer significant benefits in interpreting permeability. The Schlumberger-Doll-Research model utilizes nuclear magnetic resonance logging, which accurately estimates permeability values. The approach of this investigation is to apply artificial neural networks and core data to predict permeability in wells without a nuclear magnetic resonance log. The Schlumberger-Doll-Research permeability is use
... Show MoreHepatitis is one of the diseases that has become more developed in recent years in terms of the high number of infections. Hepatitis causes inflammation that destroys liver cells, and it occurs as a result of viruses, bacteria, blood transfusions, and others. There are five types of hepatitis viruses, which are (A, B, C, D, E) according to their severity. The disease varies by type. Accurate and early diagnosis is the best way to prevent disease, as it allows infected people to take preventive steps so that they do not transmit the difference to other people, and diagnosis using artificial intelligence gives an accurate and rapid diagnostic result. Where the analytical method of the data relied on the radial basis network to diagnose the
... Show MoreThe matter of handwritten text recognition is as yet a major challenge to mainstream researchers. A few ways deal with this challenge have been endeavored in the most recent years, for the most part concentrating on the English pre-printed or handwritten characters space. Consequently, the need to effort a research concerning to Arabic texts handwritten recognition. The Arabic handwriting presents unique technical difficulties because it is cursive, right to left in writing and the letters convert its shapes and structures when it is putted at initial, middle, isolation or at the end of words. In this study, the Arabic text recognition is developed and designed to recognize image of Arabic text/characters. The proposed model gets a single l
... Show MoreThis study focuses on how tax administrations in Iraq use Artificial Intelligence (AI) techniques to monitor tax evasion for individuals and companies to achieve Tax Compliance (TC). AI was measured through four dimensions: Advanced Data Analytics Techniques (ADAT), Explainable AI (EAI), Machine learning (ML), and Robotic Process Automation (RPA). At the same time, TC was measured through registration, accounting, and tax payment stages. We relied on the questionnaire form to measure the variables. A sample of employees in the General Tax Authority in Iraq was selected, and a questionnaire was distributed to 132 people. The results indicated that the dimensions of AI affect achieving TC at all stages. This study provides evidence of using A
... Show MoreThe study employs Critical Discourse Analysis (CDA) to analyze how technological discourses are influenced by AI-generate d English texts. The research marries Fairclough’s three-dimensional discourse analysis, Van Dijk’s socio-cognitive approach, and Corpus-Assisted Discourse Studies (CADS) in the use of mixed-methods research, integrating primarily qualitative analysis with quantitative corpus-based data, to perform a thorough analysis of twenty AI-produced English texts. The findings identify the sophisticated linguistic mechanisms through which AI language employs modality, nominalization, passive voice, and interdiscursive blending to normalize and legitimize dominant contemporary ideologies. These mechanisms serve to legitimize te
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show More