In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreObjective: To find out the relationship between the bio-social aspect with cholelithiasis patients and
demographic characteristics in Baghdad city.
Methodology: A purposive (non-probability) sample of (100) patients, from (20-70) years old, who were
selected from patients who were admitted to hospital at preoperative stage, from Gastroenterology and
Hepatology Hospital, Baghdad Teaching Hospital, Al-Yarmook Teaching Hospital, Al-Karama Teaching
Hospital, Teaching Hospital. A descriptive study was carried out from 25th of June 2004 to the end of October
2004.
An assessment form was constructed for the purpose of the study. Test-retest reliability was employed through
computation of Pearson correlation coefficient.
This study aims to evaluate the performance of the sewage treatment plant in Al-Diwaniya, one of cities in the southern part in Iraq. This evaluation could be used to facilitate effluent quality assessment or optimal process control of the plant. The influent reaching the plant is considered a medium to strong in strength with BOD5/COD ratio in the range 0.23 and 0.69 which can be considered an easily degradable sewage by the biological processes performed by the activated sludge unit. The quality of the effluent was found to be higher than the Iraqi standards for disposal to water bodies. The BOD5/COD ratios of the treated sewage varied over a wide range as low of 0.13 to 1.48 indicating operational problems in the plant. Regression ana
... Show MoreAl-Ruhbah region is located in the southwest of Najaf Governorate. A numerical model was created to simulate groundwater flow and analyze the water quality of the groundwater, by developing a conceptual model within the groundwater modeling system software. Nineteen wells were used, 15 for pumping and four for observation. A three-dimensional model was built based on the cross-sections indicating the geologic layers of the study area, which were composed of five layers. When a distance of 1,000 m between the wells was adopted, 135 wells can be operated simultaneously. These wells were hypothetically operated at 6, 12, and 18 h intervals, with a discharge of 200, 430, and 650 m