Preferred Language
Articles
/
joe-180
Buckling Loads and Effective Length Factor for Non-Prismatic Columns
...Show More Authors

Based on a finite element analysis using Matlab coding, eigenvalue problem has been formulated and solved for the buckling analysis of non-prismatic columns. Different numbers of elements per column length have been used to assess the rate of convergence for the model. Then the proposed model has been used to determine the critical buckling load factor () for the idealized supported columns based on the comparison of their buckling loads with the corresponding hinge supported columns . Finally in this study the critical buckling factor () under end force (P) increases by about 3.71% with the tapered ratio increment of 10% for different end supported columns and the relationship between normalized critical load and slenderness ratio was generalized.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 21 2013
Journal Name
Nonlinear Dynamics
BER performance enhancement for secure wireless optical communication systems based on chaotic MIMO techniques
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Alpha Tracks Examination for Female Urine Samples who are Suffering from Urinary Tract Infections
...Show More Authors

Urine samples had been gathered from females living in Baghdad city. The sample consisted of 30 females who suffered from U.T.I (Urinary tract infections) and 20 healthy females. The type of urine U.T.I was specified by the emergency lab in Al-Kindy hospital, and alpha tracks were determined by the nuclear track detector CR-39. The concentrations of alpha in 30 urine samples taken from females who had U.T.I ranged from 0.327ppm-1.583ppm, with an average of 0.94965 ppm. The maximum value 1.583 ppm is belonging to females with an aged 57 years old. The results of healthy female concentration ranged from 0.022 ppm-0.459ppm with an average of (0.30855ppm). The findings revealed that alpha emitter concentrations differed from woman to woman,

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Convergence of the Generalized Homotopy Perturbation Method for Solving Fractional Order Integro-Differential Equations
...Show More Authors

In this paper,the homtopy perturbation method (HPM) was applied to obtain the approximate solutions of the fractional order integro-differential equations . The fractional order derivatives and fractional order integral are described in the Caputo and Riemann-Liouville sense respectively. We can easily obtain the solution from convergent the infinite series of HPM . A theorem for convergence and error estimates of the HPM for solving fractional order integro-differential equations was given. Moreover, numerical results show that our theoretical analysis are accurate and the HPM can be considered as a powerful method for solving fractional order integro-diffrential equations.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 04 2021
Journal Name
Journal Of Petroleum Exploration And Production Technology
Perforation location optimization through 1-D mechanical earth model for high-pressure deep formations
...Show More Authors

Optimum perforation location selection is an important study to improve well production and hence in the reservoir development process, especially for unconventional high-pressure formations such as the formations under study. Reservoir geomechanics is one of the key factors to find optimal perforation location. This study aims to detect optimum perforation location by investigating the changes in geomechanical properties and wellbore stress for high-pressure formations and studying the difference in different stress type behaviors between normal and abnormal formations. The calculations are achieved by building one-dimensional mechanical earth model using the data of four deep abnormal wells located in Southern Iraqi oil fields. The magni

... Show More
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Deriving the Composite Simpson Rule by Using Bernstein Polynomials for Solving Volterra Integral Equations
...Show More Authors

In this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
Baghdad Science Journal
Smart Flow Steering Agent for End-to-End Delay Improvement in Software-Defined Networks
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Thu Dec 04 2014
Journal Name
Engineering And Technology Journal
Optimization of the Time Required for Determination of the Total Dissolved Salts in Soil ‫
...Show More Authors

Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Evaluation the Biosorption Capacity of Water Hyacinth (Eichhornia crassipes) Root for Some Heavy Metals
...Show More Authors

Heavy metals especially lead (Pb), cadmium (Cd), chromium (Cr) and copper (Cu) are noxious pollutants with immense health hazards on living organisms, these pollutants enter aquatic environment in Iraq mainly Tigris and Euphrates rivers via waste water came from different anthropological activities, This study investigated capacity of dried and ground root of water hyacinth (Eichhornia crassipes) in removing the heavy metals from their aqueous solutions. Effects of initial concentrations of the heavy metals and pH of their aqueous solutions were studied. Results of this study revealed excellent biosorption capacity of water hyacinth root in general, removal of Pb was the highest and Cr was lowest. The results showed that the Pb, Cu and C

... Show More
View Publication Preview PDF