Preferred Language
Articles
/
joe-2193
Finite Element Analysis of Reinforced Concrete T-Beams with Multiple Web Openings under Impact Loading
...Show More Authors

In this study, a three-dimensional finite element analysis using ANSYS 12.1 program had been employed to simulate simply supported reinforced concrete (RC) T-beams with multiple web circular openings subjected to an impact loading. Three design parameters were considered, including size, location and number of the web openings. Twelve models of simply supported RC T-beams were subjected to one point of transient (impact) loading at mid span. Beams were simulated and analysis results were obtained in terms of mid span deflection-time histories and compared with the results of the solid reference one. The maximum mid span deflection is an important index for evaluating damage levels of the RC beams subjected to impact loading. Three experimental T-beams were considered in this study for calibration of the program. All models had an identical cross-section and span similar to those of the experimental beams. The diameter of the openings of the experimental beams was 110 mm. Three other diameters were varied (50, 80 and 130) mm. The location of the face of the opening with respect to the location of impact loading was investigated (the face of the opening at distance varied 0d, 0.5d, 1d and 1.5d from the location of loading, where d is the effective depth) and the number of web openings was varied (2,4 and 6) openings. All modeled beams subjected to dropping mass of 24.5 kg with height of drop of 250 mm (as for the experimental beams). Results obtained from this study showed that the behavior of beams with circular openings of diameter equal to 22% the web depth has a small effect on the response of the RC T-beams. On the other hand, introducing circular openings with a diameter equal to 35% and 57% of the web depth (80 and 130 mm) increases the maximum mid span deflection by 23% and 43% respectively. Results also showed that, openings with a distance greater than or equal to 1.5 d from the location of impact loading have no effect on the deflection of the RC beams.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Personality Type and its Relationship with Withdrawal Observer
...Show More Authors

The current research was aimed at the following:
1. Measurement of Personality Type Observer of the University students.
2. Identify the differences in Personality Type Observer among the University students according to variable of Sex (male / female). And according to variable of Specialization (scientific / literary)
3. Measurement of Withdrawal of the University students.
4. Identify the differences in Withdrawal among the University students according to variable of Sex (male / female). And according to variable of Specialization (scientific / literary).
5. Identify the relationship between Personality Type Observer and Withdrawal.
To achieve this aims of the research, the researchers set up the instrument is scale

... Show More
View Publication Preview PDF
Publication Date
Sun May 10 2026
Journal Name
Iraqi Journal Of Mechanical And Material Engineering
WAKE ROLL-UP BEHIND WINGS WITH GROUND EFFECT
...Show More Authors

A numerical method for the calculation of the three-dimensional wake rollup behind symmetric wings with ground effect and its aerodynamic characteristics for steady low subsonic flow have been developed. A non-planar quadrilateral vortex-ring method with vortex wake relaxation iterative scheme for lifting surfaces is obtained. A computer program was build to treat wings with breaks, span wise trailing edge flaps, local dihedral angle, camber, twist and ground effect. Forces and moments are obtained from vector product of local velocity and vortex strength multiplied by density. The program has been validated for a number of configurations for which experimental data is available. Good agreement has been obtained for these configurations. Al

... Show More
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
On New Weibull Inverse Lomax Distribution with Applications
...Show More Authors

In this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data  sets

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Laparoscopic versus open appendectomy in patients with acuteappendicitis
...Show More Authors

Background: Laparoscopic surgery for
appendicitis is now a well established and
advanced method of performing general surgical
procedures.
Objectives: To compare the outcome of
laparoscopic and open appendectomies in terms
of operative time, analgesic requirement,
postoperative complications, hospital stay, return
to normal activity and condition of scar.
Methods: This prospective study was carried
out from 1stMay 2008-1st January 2010, involving
110 patients (45 male and 65 female) with
features suggestive of acute appendicitis were
divided into 45 patients laparoscopic
appendectomy (LA) group and 65 patients open
appendectomy (OA) group, after taking informed
consent. LA was done with the

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 18 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Detecting Deepfakes with Deep Learning and Gabor Filters
...Show More Authors

The proliferation of many editing programs based on artificial intelligence techniques has contributed to the emergence of deepfake technology. Deepfakes are committed to fabricating and falsifying facts by making a person do actions or say words that he never did or said. So that developing an algorithm for deepfakes detection is very important to discriminate real from fake media. Convolutional neural networks (CNNs) are among the most complex classifiers, but choosing the nature of the data fed to these networks is extremely important. For this reason, we capture fine texture details of input data frames using 16 Gabor filters indifferent directions and then feed them to a binary CNN classifier instead of using the red-green-blue

... Show More
View Publication
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Food Science And Technology
Analyzing food production risk with Monte Carlo simulation
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Oct 02 2015
Journal Name
American Journal Of Applied Sciences
Advances in Document Clustering with Evolutionary-Based Algorithms
...Show More Authors

Document clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 16 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Optimization algorithms for transportation problems with stochastic demand
...Show More Authors

The purpose of this paper is to solve the stochastic demand for the unbalanced transport problem using heuristic algorithms to obtain the optimum solution, by minimizing the costs of transporting the gasoline product for the Oil Products Distribution Company of the Iraqi Ministry of Oil. The most important conclusions that were reached are the results prove the possibility of solving the random transportation problem when the demand is uncertain by the stochastic programming model. The most obvious finding to emerge from this work is that the genetic algorithm was able to address the problems of unbalanced transport, And the possibility of applying the model approved by the oil products distribution company in the Iraqi Ministry of Oil to m

... Show More
View Publication
Scopus (15)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Fme Transactions
Unsteady nonlinear panel method with mixed boundary conditions
...Show More Authors

A new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF