Preferred Language
Articles
/
KhYh0ooBVTCNdQwCEKbc
Lattice Boltzmann method with moment-based boundary conditions for rarefied flow in the slip regime
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Apr 27 2023
Journal Name
Civileng
Numerical Modeling and Analysis of Strengthened Steel–Concrete Composite Beams in Sagging and Hogging Moment Regions
...Show More Authors

Strengthening of composite beams is highly needed to upgrade the capacities of existing beams. The strengthening methods can be classified as active or passive techniques. Therefore, the main purpose of this study is to provide detailed FE simulations for strengthened and unstrengthened steel–concrete composite beams at the sagging and hogging moment regions with and without profiled steel sheeting. The developed models were verified against experimental results from the literature. The verified models were used to present comparisons between the effect of using external post-tensioning and CFRP laminates as strengthening techniques. Applying external post-tensioning at the sagging moment regions is more effective because of the e

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Alexandria Engineering Journal
The operational matrix of Legendre polynomials for solving nonlinear thin film flow problems
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Alexandria Engineering Journal
The operational matrix of Legendre polynomials for solving nonlinear thin film flow problems
...Show More Authors

Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Nov 05 2021
Journal Name
Journal Of Architectural Environment & Structural Engineering Research
Strength & Conduct of Reinforced Concrete Corner Joint under Negative Moment Effect
...Show More Authors

The aim of our study is to reveal the effect of steel reinforcement details,tensile steel reinforcement ratio, compressed reinforcing steel ratio,reinforcing steel size, corner joint shape on the strength of reinforcedconcrete Fc' and delve into it for the most accurate details and concreteconnections about the behavior and resistance of the corner joint ofreinforced concrete, Depending on the available studies and sources inaddition to our study, we concluded that each of these effects had a clearrole in the behavior and resistance of the corner joint of reinforced concreteunder the influence of the negative moment and yield stress. A studyof the types of faults that can be reinforced angle joints obtains detailsand conditions of c

... Show More
View Publication
Crossref (14)
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Int. J. Advance Soft Compu. Appl,
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Advance Science And Technology
MR Images Classification of Alzheimer's Disease Based on Deep Belief Network Method
...Show More Authors

Background/Objectives: The purpose of this study was to classify Alzheimer’s disease (AD) patients from Normal Control (NC) patients using Magnetic Resonance Imaging (MRI). Methods/Statistical analysis: The performance evolution is carried out for 346 MR images from Alzheimer's Neuroimaging Initiative (ADNI) dataset. The classifier Deep Belief Network (DBN) is used for the function of classification. The network is trained using a sample training set, and the weights produced are then used to check the system's recognition capability. Findings: As a result, this paper presented a novel method of automated classification system for AD determination. The suggested method offers good performance of the experiments carried out show that the

... Show More
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2012
Journal Name
Journal Of Engineering
Study on wind loads coefficients and flow field characteristics around the parabolic trough with stiffeners
...Show More Authors

wind load coefficient