Preferred Language
Articles
/
joe-2166
Buckling Analysis Of Damaged Composite Plates Under Uniform Or Non-Uniform Compressive Load
...Show More Authors

The present study focused mainly on the buckling behavior of composite laminated plates subjected to mechanical loads. Mechanical loads are analyzed by experimental analysis, analytical analysis (for laminates without cutouts) and numerical analysis by finite element method (for laminates with and without cutouts) for different type of loads which could be uniform or non-uniform, uniaxial or biaxial. In addition to many design parameters of the laminates such as aspect ratio, thickness ratio, and lamination angle or the parameters of the cutout such as shape, size, position, direction, and radii rounding) which are changed to studytheir effects on the buckling characteristics with various boundary conditions. Levy method of classical laminated plate theory and Finite element coded by ANSYS 13.0 is used to formulate the theoretical model. Results are compared with other researches and good agreement was obtained.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 03 2014
Journal Name
Heat Transfer - Asian Research
CFD Simulation of Heat Transfer Augmentation in a Circular Tube fitted with Alternative Axis Twisted Tape in Laminar Flow under the Constant Heat Flux
...Show More Authors

Publication Date
Tue May 02 2023
Journal Name
Journal Of Physical Education
Designing compound exercises with hardware technology and its impact on some physical and skill abilities of the Airways Club players under (19) years old.
...Show More Authors

ER Abbas, AA Jasim, Journal of Physical Education, 2023 - Cited by 1

View Publication
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Application of data content analysis (DEA) technology to evaluate performance efficiency: applied research in the General Tax Authority
...Show More Authors

The aim of the research is to use the data content analysis technique (DEA) in evaluating the efficiency of the performance of the eight branches of the General Tax Authority, located in Baghdad, represented by Karrada, Karkh parties, Karkh Center, Dora, Bayaa, Kadhimiya, New Baghdad, Rusafa according to the determination of the inputs represented by the number of non-accountable taxpayers and according to the categories professions and commercial business, deduction, transfer of property ownership, real estate and tenders, In addition to determining the outputs according to the checklist that contains nine dimensions to assess the efficiency of the performance of the investigated branches by investing their available resources T

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2025
Journal Name
Chinese Journal Of Analytical Chemistry
Synthesis, characterization, antioxidant and bioactivity assessment, and thermodynamic analysis of metal ion complexes using a novel azo dye
...Show More Authors

In this study, the new azo dye,5,5-[1,2-phenylenebis(2,1-biazenediyl)] bis[8-quinolino], was used to synthesize complexes with Co2+, Ni2+, Cu2+, Zn2+, and Cd2+ ions. The compounds were characterized using 1H and 13C nuclear magnetic resonance (NMR) spectroscopy, Fourier transform infrared (FT-IR) spectroscopy, ultraviolet-visible (UV-Vis) spectroscopy, mass spectrometry, thermo gravimetric analysis (TGA), diffevential scanning calovimltry (DSC), CHN analysis. Further, conductivity, magnetic susceptibility, and metal and chlorine content analysis using FT-IR spectroscopy revealed that the ligand chelates as a bidentate (OH) phenol group and a bidentate (C=N) ring group. The ligand exhibited tetradentate behavior, forming tetrahedral complexe

... Show More
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Histological variety analysis for pleomorphic adenoma in salivary glands: Retrospective study
...Show More Authors

Pleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Mefenamic Acid Selective Membranes Sensor and Its Application to pharmaceutical Analysis
...Show More Authors

PVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Digital Rock Samples Porosity Analysis by OTSU Thresholding Technique Using MATLAB
...Show More Authors

Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Natural-Convection Phenomenon from a Finned Heated Vertical Tube: Experimental Analysis
...Show More Authors

       In this work, an experimental analysis is made to predict the thermal performance of the natural-convection phenomenon from a heated vertical externally finned-tube to surrounding air through an open-ended enclosure. Two different configurations of longitudinal rectangular fin namely, continuous and interrupted are utilized with constant thickness, different numbers, and different heights are extended radially on the outer surface of a heated tube. The tube is heated electrically from inner surface with five varied power input magnitudes. The effect of fins configuration, fins number, fins height, and heat flux of the inner tube surface on the thermal performance of natural c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref