This paper studies the effect of contact areas on the transient response of mechanical structures. Precisely, it investigates replacing the ordinary beam of a structure by two beams of half the thickness, which are joined by bolts. The response of these beams is controlled by adjusting the tightening of the connecting bolts and hence changing the magnitude of the induced frictional force between the two beams which affect the beams damping capacity. A cantilever of two beams joined together by bolts has been investigated numerically and experimentally. The numerical analysis was performed using ANSYS-Workbench version 17.2. A good agreement between the numerical and experimental results has been obtained. In general, results s
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show MoreThis study deals with the subject of violence, but from another perspective, it has not been emphasized in contemporary studies of violence in Arabic and raqi universities, which is the structural or institutional aspect of violence. Traditional studies have focused their analysis of violence on the direct side the violence, The other side of the violence is the hidden violence, which is characterized by a lack of clarity of the underlying factors and its effects are not arises, which makes it the most serious violence, which requires a deep research into the social, political, economic, cultural and psychological structure of society (individuals and institutions). This study was based on the theory of the Norwegian scientist (J
... Show MoreIntroduction: Infection control or hospital-acquired infections are the major concern of the health care system and agencies. Critical care nurses are on the first-line contact with the patients, so on, they are most vulnerable to acquired infections. It is really important to regularly check their knowledge and practices concerning infection control. Objectives: The study aims to identify the impact of years’ experience on nurses’ knowledge and practices concerning infection control in three hospitals and center (Baghdad teaching hospital, Ibn Al-Nafees hospital, and Ibn al-Bitar center) Methodology: Cross-sectional study was conducted, the study starting from 4th of July 2020 to 13th of November 2020. Non-probability (purposive) sampl
... Show MoreThe results of the analysis showed that there is a correlation between ISO 9001 and the competitive advantage, which shows that the implementation of ISO 9001 in the private colleges achieves a competitive advantage through its ability to employ the entrance of quality systems management according to ISO 9001, By focusing on improving the quality of its educational services in accordance with a clear and understandable policy for all and its ability to meet the expectations, expectations and wishes of students and beneficiaries, which leads to lower costs of operations compared to other colleges and achieve a higher level of reliability and quality and value of services provided and rapid respon
... Show MoreBackground: Women sexuality is basic right and it plays a major role in women's Health aspects. Up is one of the factors that lead to sexual dysfunction while the incidence of it is rising as UP severity being more. Objectives: To assess the impact of different degrees of uterine prolapse on sexual function of women at teaching hospitals in AL-Hilla City. Methodology: A descriptive analytical study was conducted from 1ST Feb to 10th Jun /2014 to assess the impact of different degrees of uterine prolapse on sexual function for women who attend to consultant clinic at teaching hospitals in AL-Hilla City
Objective: impact of the education program for nurses' knowledge toward children under mechanical
ventilation, and to find out the relationships between nurses' knowledge and their general information.
Methodology: Quasi experimental study was carried out at the respiratory care units of Baghdad
Pediatric Teaching Hospitals started from February15th, until September 26th, 2011, A purposive (nonprobability)
sample of (23) nurses working in the respiratory care units, were selected from Children
Welfare and Pediatric Central Teaching Hospitals. The data were gathered through using of the
constructed multiple choice questionnaire using to evaluate the nurses knowledge using checklist, The
questionnaire consists of two p
—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.