Preferred Language
Articles
/
joe-446
Deterministic Analysis of Wind Loads Effects on High-Rise Buildings
...Show More Authors

This paper studies the effect of mean wind velocity on tall building. Wind velocity, wind profile and wind pressure have been considered as a deterministic phenomenon. Wind velocity has been modelled as a half-sinusoidal wave. Three exposures have been studied B, C, and D. Wind pressure was evaluated by equation that joined wind pressure with mean wind velocity, air density, and drag coefficient.

Variations of dynamic load factor for building tip displacement and building base shear were studied for different building heights, different mode shapes, different terrain exposures, and different aspect ratios of building plan. SAP software, has been used in modelling and dynamic analysis for all case studies.

Results For different building heights considered maximum dynamic load factor (DLF) occurs in height range from 100-150m because fundamental building frequency is so close as to dominate wind frequency. Effects of higher modes become insignificant for height greater than 175m. Effect of three different terrain exposures B, C, and D on DLF for tips displacement and building base shear have been insignificant effect on response of tip displacement and building base shear. . Finally, effect of aspect ratio  for different building heights with dynamic load factor (DLF) for tips displacement and for building base shear have  approaching 2, fundamental building frequency is so closed to dominate wind frequency.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Four antibiotics to prevent expansion corruption high fever
...Show More Authors

The research aims to highlight on the reasons of financial & managerial corruption phenomena and to suggest systems & methods that promote controlling and developing the mechanism to combat corruption it also highlights on the ways that should available to enable the three regulatory agencies to reduce this phenomenon. The research depends on the following hypothesis "the governance of state institutions and the application of electronic government with depending on a correct mechanism to crossing auditing and the equilibrium performance model well help to reduce corruption phenomenon in Iraq" the two researchers have been concluded some conclusions the main one is that so many reasons of corruption starting from the bad

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
Preparation Scale father control when junior high students
...Show More Authors

The family found itself confused any of the methods of dealing (Control - democracy) follow to reach the best level in education, what was favorite yesterday about a father dealing with his children control which showed generations characterized by high levels of self-esteem and decision-making, today rejected and opposed it. As some believe that a sense of control generates a negative represented by fear and frustration.
Find the goal of preparing the current scale of the father control when junior high students.
To achieve this goal, has been preparing a tool to measure the father control after that, the researcher extract the validity and reliability of the scale, and then applied to a sample of 500 students from junior high sch

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 03 2021
Journal Name
Entropy
Reliable Recurrence Algorithm for High-Order Krawtchouk Polynomials
...Show More Authors

Krawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the

... Show More
View Publication
Scopus (34)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Iraqi stock market structure analysis based on minimum spanning tree
...Show More Authors

tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.

View Publication
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effects of Different Concentrations of Melatonin on the Time-course of Nitrite–induced Oxidation of Hemoglobin: In vitro Study
...Show More Authors

         Melatonin is a potent scavenger of reactive oxygen species or free radicals like superoxide and hydroxyl radicals. The oxidation of hemoglobin to methemoglobin (meth-Hb) by oxidizing compounds has been widely studied. The present work was designed to evaluate the ability of different concentrations of melatonin to inhibit nitrite–induced oxidation of hemoglobin. Blood samples were obtained from apparently healthy individuals from which erythrocyte hemolysate was prepared. Different concentrations of melatonin (10-9-1.0 mg/ml) were incubated for 10 min with the hemolysate, then to the resultant mixture 1 ml of sodium nitrite (final concentration 0.6 mM) was added, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of Robust Principal Components Depends on the some methods of Projection-Pursuit
...Show More Authors

The analysis of the classic principal components are sensitive to the outliers where they are calculated from the characteristic values and characteristic vectors of correlation matrix or variance Non-Robust, which yields an incorrect results in the case of these data contains the outliers values. In order to treat this problem, we resort to use the robust methods where there are many robust methods Will be touched to some of them.

   The robust measurement estimators include the measurement of direct robust estimators for characteristic values by using characteristic vectors without relying on robust estimators for the   variance and covariance matrices. Also the analysis of the princ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Application of Multi-Objective Optimization on the basis of Ratio Analysis (MOORA) Method
...Show More Authors

The paper aims is to solve the problem of choosing the appropriate project from several service projects for the Iraqi Martyrs Foundation or arrange them according to the preference within the targeted criteria. this is done by using Multi-Criteria Decision Method (MCDM), which is the method of Multi-Objective Optimization by Ratios Analysis (MOORA) to measure the composite score of performance that each alternative gets and the maximum benefit accruing to the beneficiary and according to the criteria and weights that are calculated by the Analytic Hierarchy Process (AHP). The most important findings of the research and relying on expert opinion are to choose the second project as the best alternative and make an arrangement acco

... Show More
View Publication Preview PDF
Crossref