This paper deals with finite element modeling of the ultimate load behavior of double skin composite (DSC) slabs. In a DSC slab, shear connectors in the form of nut bolt technique studs are used to transfer shear between the outer skin made of steel plates and the concrete core. The current study is based on finite element analysis using ANSYS Version 11 APDL release computer program. Experimental programmes were carried out by the others, two simply supported DSC beams were tested until failure under a concentrated load applied at the center. These test specimens were analyzed by the finite element method and the analyses have shown that these slabs displayed a high degree of flexural characteristics, ultimate strength,
... Show MoreThe study was performed to analyze the oropharynx airway and examine the influence of age and gender on the oropharynx volume configuration using cone beam computed tomography.
This study examined the cone beam computed tomographic images of 51 patients 25 male and 26 females, group matched for age and gender. The oropharynx airway volume and area between the posterior nasal spine and top of the epiglottis were measured and compared.
Background: This study designed to shade light on the important role of CBCT in accurate localization of the impacted maxillary canines. Materials and method: Fifty two unilateral and bilateral impacted maxillary canines from 30 patients (24 females and 6 males) were evaluated by a volumetric 3D images obtained from cone beam CT. All samples attended to the specialist health center of dentistry in Al-Sadder City referred to CBCT by oral surgeons or orthodontists to detect the exact position of impacted upper canine in cases when there was no bulging buccally or palatally which aids to detect the exact position. Results: Mesio-palatal angulations had the highest rate (63.5%) followed by mesio-labial (19.2%), vertical (labial) (9.6%), disto-p
... Show MoreOver the years, the field of Medical Imagology has gained considerable importance. The number of neuroimaging studies conducted using functional magnetic resonance imaging (fMRI) has been exploding in recent years. fMRI survey gives to rise to large amounts of noisy data with a complex spatiotemporal correlation structure. Statistics play great role in clarifying the features of the data and gain results that can be used and explain by neuroscientists. Several types of artifacts can happen through a functional magnetic resonance imaging (fMRI) scanner Because of software or hardware problems, physical limitation or human physiologic phenomenon. Several of them can negatively affect di
Rotating fan shaft system was investigated experimentally and theoretically to study its dynamic performance. The type of oil used for the bearing was taken in consideration during the experimental program .Three types of oil were used, SAE 40, SAE 50 and degraded oil. During the experiments, the fan blades stagger angle was changed through angles (20˚, 30˚, 40˚, and 50˚). The shaft rotational speed also changed in the range of (0-3000 rpm). All these parameters have investigated for two cases (balanced and unbalanced fan). The performance parameters of the fan were found experimentally by measuring the fan, volume flow rate, Reynolds and Strouhal numbers, efficiency and pressure head. Analytical part was also represented to prepare
... Show More: The terrestrial snail Eobania vermiculata (O. F. Müller, 1774) were collected from three station in Baghdad Al- Karkh, Iraq between the period from June 2016 to July 2017. Then we studied the life cycle from the egg to maturity. We studied and photographed the external morphology of it’s shell to identified the species. This species was recorded for the first time in Baghdad.
Due to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula
... Show MoreIn this paper the method of singular value decomposition is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.
Construction projects have become a changing dramatically in recent decades and that the goal of the beneficiaries of the implementation of structural project is to complete the work with less time and within the cost of the specific and the best possible quality may sometimes happen that highlights the importance of time on the rest of the items at the implementation of projects for various reasons, including the need to use the project as soon as possible possible change rapidly to customer's requests, but the high cost of the project represents the biggest obstacle for entrepreneurs with its effects on the quality and the time workers, and is a measure of those elements in monetary terms is the key to integration between them, so the
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show More