Preferred Language
Articles
/
7hcqe44BVTCNdQwCcEl7
A NEW APPROACH FOR MODELLING THE VIBRATION OF BEAMS UNDER MOVING LOAD EFFECT
...Show More Authors

In this paper, a new equivalent lumped parameter model is proposed for describing the vibration of beams under the moving load effect. Also, an analytical formula for calculating such vibration for low-speed loads is presented. Furthermore, a MATLAB/Simulink model is introduced to give a simple and accurate solution that can be used to design beams subjected to any moving loads, i.e., loads of any magnitude and speed. In general, the proposed Simulink model can be used much easier than the alternative FEM software, which is usually used in designing such beams. The obtained results from the analytical formula and the proposed Simulink model were compared with those obtained from Ansys R19.0, and very good agreement has been shown. It was found that the maximum vibration occurs when the load speed is about 0.58 of the critical speed of the beam. Furthermore, the vibration amplitude resulting from a moving load can amplify to 1.65 times the deflection produced by an equivalent static load.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 20 2006
Journal Name
Journal Of Legal Sciences
Provisions of economic concentrations between undertakings A comparative study
...Show More Authors

Economic concentration between undertakings is considered of common transactions in the commercial  environment . So it was not seen as practices that can affect  on the competition, or that it is misused to achieve purposes that are contrary to free and fair competition.

In fact, concentration Transactions may to be  affect on competition, Where Economic concentration has undeniable benefits, so it was not possible to prevent these Transactions. Instead, the laws tended to control concentration and avoid harming it. And  obtain of its benefits.

 This study highlights  on the provisions of economic concentration between undertakings, and detection of the mechanism through which to cont

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Force degradation of orthodontic elastomeric chains: A literature review
...Show More Authors

Background: Elastomeric chains are used to generate force in many orthodontic procedures, but this force decays over time, which could affect tooth movement. This study aimed to study the force degradation of elastomeric chains. Data and Sources: An electronic search on Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, LILACS, and PubMed was made, only articles written in English were included, up to January 2022.Study selection: Fifty original articles, systematic reviews, and RCTs were selected. Conclusion: Tooth movement, salivary enzymes, alcohol-containing mouthwash, whitening mouthwash, and alkaline and strong acidic (pH <5.4) solutions all have a significant impact on elastomeric chain force degradation. The fo

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Interval Value Fuzzy k-Ideals of a KU-Semigroup
...Show More Authors

The notion of interval value fuzzy k-ideal of KU-semigroup was studied as a generalization of afuzzy k-ideal of KU-semigroup. Some results of this idea under homomorphism are discussed. Also, we presented some properties about the image (pre-image) for interval~ valued fuzzy~k-ideals of a KU-semigroup. Finally, the~ product of~ interval valued fuzzyk-ideals is established.

 

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Feb 10 2021
Journal Name
Journal Of Legal Sciences
ISIS Violations of International Law “Iraq as a model”
...Show More Authors

The Iraqi people were subjected to the most brutal crime in the history of humanity when ISIS violated the rights system and targeted women, children, civilians, minorities, religion, belief and the right to education and committed many crimes of genocide and crimes against humanity and the abandonment of millions of citizens and the recruitment of thousands of children, which constituted a flagrant violation of human rights and international law It emphasizes the gravity of the threat to international peace and security by the organization and its associated individuals, groups, institutions and entities, including foreign terrorist fighters.

          That the legal characterization

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Bayes Estimator as a Function of Some Classical Estimator
...Show More Authors

Maximum likelihood estimation method, uniformly minimum variance unbiased estimation method and minimum mean square error estimation, as classical estimation procedures, are frequently used for parameter estimation in statistics, which assuming the parameter is constant , while Bayes method assuming the parameter is random variable and hence the Bayes estimator is an estimator which minimize the Bayes risk for each value the random observable and for square error lose function the Bayes estimator is the posterior mean. It is well known that the Bayesian estimation is hardly used as a parameter estimation technique due to some difficulties to finding a prior distribution.

The interest of this paper is that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 10 2024
Journal Name
The American Journal Of Interdisciplinary Innovation And Research
SUBJECT: REVIEW METHODS OF DETECTING SUGAR IN A SAMPLE
...Show More Authors

Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Revealed of A novel Allele in Wasit – Iraqi Population
...Show More Authors

The developments in forensic DNA technology have led us to perform this study in Iraqi population as reference database of autosomal Short Tandem Repeat (aSTR) DNA markers . A total of 120 unrelated individuals from Wasit province were analyzed at 15 STR DNA markers. Allele frequencies of DNA typing loci included in the AmpFlSTR1 IdentifilerTM PCR Amplification Kit panel from Applied Biosystems (D3S1358, vWA, FGA, D8S1179, D21S11, D18S51, D5S818, D13S317, D7S820, TH01, TPOX, CSF1PO, D19S433, D2S1338, D16S539) and several forensic efficiency statistical parameters were estimated from all the sample. the combined Matching Probability (CMP) using the 15 STR genetic loci in Iraqi population was estimated at 1 in 2.08286E-18 and the Combined

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Water Pollution And Management Practices
Existence of Antibiotics in Wastewater as a Pollution Indicator
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Mon Apr 08 2019
Journal Name
International Journal Of Building Pathology And Adaptation
A scientometric analysis of BIM studies in facilities management
...Show More Authors
Purpose

The purpose of this paper is to statistically classify and categorize Building Information Modelling (BIM)-Facility Management (FM) publications in order to extract useful information related to the adoption and use of BIM in FM.

Design/methodology/approach

This study employs a quantitative approach using science mapping techniques to examine BIM-FM publications using Web of Science (WOS) database for the period between 2000 and April 2018.

Findings

The findi

... Show More
View Publication
Scopus (32)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref