Current numerical research was devoted to investigating the effect of castellated steel beams without and with strengthening. The composite concrete asymmetrical double hot rolled steel channels bolted back to back to obtain a built-up I-shape form are used in this study. The top half part of the steel is smaller than the bottom half part, and the two parts were connected by bolting and welding. The ABAQUS/2019 program employed the same length and conditions of loading for four models: The first model is the reference without castellated and strengthening; the second model was castellated without strengthened; the third model was castellated and strengthened with reactive powder concrete encased in the
... Show MoreThis paper investigated the treatment of textile wastewater polluted with aniline blue (AB) by electrocoagulation process using stainless steel mesh electrodes with a horizontal arrangement. The experimental design involved the application of the response surface methodology (RSM) to find the mathematical model, by adjusting the current density (4-20 mA/cm2), distance between electrodes (0.5-3 cm), salt concentration (50-600 mg/l), initial dye concentration (50-250 mg/l), pH value (2-12 ) and experimental time (5-20 min). The results showed that time is the most important parameter affecting the performance of the electrocoagulation system. Maximum removal efficiency (96 %) was obtained at a current density of 20 mA/cm2, distance be
... Show MoreEnergy use is second to staffing in building operating costs. Sustainable technology in the energy sector is based on utilizing renewable sources of energy such as solar, wind, glazing systems, insulation. Other areas of focus include heating, ventilation and air conditioning; novel materials and construction methods; improved sensors and monitoring systems; and advanced simulation tools that can help building designers make more energy efficient choices. The objective of this research is studying the effect of insulations on energy consumption of buildings in Iraq and identifying the amount of energy savings from application th
... Show MoreThe activity of the aqueous extract of Olea europaea was tested at concentrations of 8, 15 or 20 mg/kg of body weight on lipid profile in twenty female local rabbits. These animals were randomly divided into four groups (five animals in each group). Three groups were dosed orally with the concentrations mentioned above, while the last was administered with distilled water and considered as a control group. These animals were orally dosed by aqueous extract using a micropipette for 30 days. The results showed that there was a significant (P<0.05) decrease in cholesterol, triglycerides, low density lipoprotein (LDL-cholesterol), very low density lipoprotein (VLDL-cholesterol) concentrations and atherosclerosis index means for the three trea
... Show MoreNanoparticles of humic acid and iron oxide were impregnated on the inert sand to produce sorbent for treating groundwater contained of cadmium and copper ions by technology of permeable reactive barrier (PRB). Sewage sludge was the source of the humic acid to prepare the coated sand by humic acid—iron oxide (CSHAIO) sorbent; so, this work is consistent with sustainable development. For 10 mg/L metal concentration, batch tests at speed of 200 rpm signified that the removal efficiencies are greater than 90% at sorbent dosage 0.25 g/ 50 mL, pH 6 and contact time 1 h. The kinetic data was well described by the Pseudo first-order model indicating that physicosorption is the predominant mechanism. The maximum adsorption capacities (qmax) were c
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreThe researches to discover useful ways to represent the agents and agent-based
systems are continuous. Unified Modeling Language (UML) is a visual modeling language
used for software and non software modeling systems. The aim of this paper is: using UML
class diagram to design treasury pharmaceuticals agent and explain its internal action. The
diagram explains the movement of the agent among other nodes to achieve user's requests
(external) after it takes them. The paper shows that it is easy to model the practical systems by
using agent UML when they are used in a complex environment.
A new mathematical model describing the motion of manned maneuvering targets is presented. This model is simple to be implemented and closely represents the motion of maneuvering targets. The target maneuver or acceleration is correlated in time. Optimal Kalman filter is used as a tracking filter which results in effective tracker that prevents the loss of track or filter divergency that often occurs with conventional tracking filter when the target performs a moderate or heavy maneuver. Computer simulation studies show that the proposed tracker provides sufficient accuracy.