Preferred Language
Articles
/
6Ra2R4cBVTCNdQwC0EDQ
Analysis of Structural Concrete Bar Members Based on Secant Stiffness Methods
...Show More Authors
Abstract<p>In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated through the strain profiles, stress distribution, normal force-axial strain, and moment-curvature relationships, shows that the numerical model has good numerical accuracy and is capable of predicting the behavior of structural concrete members with different partially prestressing ratios at serviceability and ultimate loading stages.</p>
Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2019
Journal Name
Journal Of Engineering
Influence of Liquid Asphalt on Resilient Modules and Permanent Deformation of Recycled Asphalt Concrete
...Show More Authors

Tests were performed on Marshall samples and were implemented for permanent deformation and resilient modulus (Mr) under indirect tensile repeated loading (ITRL), with constant stress level. Two types of liquid asphalt (cutback and emulsion) were tried as recycling agents, aged materials that were reclaimed from field (100% RAP), samples were prepared from the aged mixture, and two types of liquid asphalt (cutback and emulsion) with a weight content of 0.5% were utilized to prepare a recycled mixture. A group of twelve samples was prepared for each mixture; six samples were tested directly for ITRL test (three samples at 25˚C and three samples at 40˚C), an average value for ITRL for every three samples was calculated (

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Irradiation Duration Effect of Gamma Ray on the Compressive Strength of Reactive Powder Concrete
...Show More Authors

Reactive Powder Concrete (RPC) could be considered as the furthermost significant modern high compressive strength concrete. In this study, an experimental investigation on the impact of micro steel fiber volume fraction ratio and gamma ray irradiation duration influence upon the compressive strength of RPC is presented. Three volume fraction ratios (0.0, 1.0 and 1.5) % was implemented. For each percentage of the adopted fiber ratios, six different irradiation duration was considered; these are (1, 2, 3, 4, 5 and 6) days. Gamma source (Cs-137) of energy (0.662) MeV and activity (6) mci was used. In a case of zero volume fraction ratio, the experimental results showed that gamma ray had a significant influence on the reducing of the

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Irradiation Duration Effect of Gamma Ray on the Compressive Strength of Reactive Powder Concrete
...Show More Authors

Reactive Powder Concrete (RPC) could be considered as the furthermost significant modern high compressive strength concrete. In this study, an experimental investigation on the impact of micro steel fiber volume fraction ratio and gamma ray irradiation duration influence upon the compressive strength of RPC is presented. Three volume fraction ratios (0.0, 1.0 and 1.5) % was implemented. For each percentage of the adopted fiber ratios, six different irradiation duration was considered; these are (1, 2, 3, 4, 5 and 6) days. Gamma source (Cs-137) of energy (0.662) MeV and activity (6) mci was used. In a case of zero volume fraction ratio, the experimental results showed that gamma ray had a significant influence on the reducing of the

... Show More
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 01 2016
Journal Name
International Educational Scientific Research Journal
EFFICIENTMETHODSOFIRISRECOGNITION
...Show More Authors

Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit

... Show More
Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
Deep Learning-based Predictive Model of mRNA Vaccine Deterioration: An Analysis of the Stanford COVID-19 mRNA Vaccine Dataset
...Show More Authors

The emergence of SARS-CoV-2, the virus responsible for the COVID-19 pandemic, has resulted in a global health crisis leading to widespread illness, death, and daily life disruptions. Having a vaccine for COVID-19 is crucial to controlling the spread of the virus which will help to end the pandemic and restore normalcy to society. Messenger RNA (mRNA) molecules vaccine has led the way as the swift vaccine candidate for COVID-19, but it faces key probable restrictions including spontaneous deterioration. To address mRNA degradation issues, Stanford University academics and the Eterna community sponsored a Kaggle competition.This study aims to build a deep learning (DL) model which will predict deterioration rates at each base of the mRNA

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More