Preferred Language
Articles
/
LhZmGIcBVTCNdQwC1jaP
Evaluation of a fire safety risk prediction model for an existing building
...Show More Authors
Abstract<p>Fire is one of the most critical risks devastating to human life and property. Therefore, humans make different efforts to deal with fire hazards. Many techniques have been developed to assess fire safety risks. One of these methods is to predict the outbreak of a fire in buildings, and although it is hard to predict when a fire will start, it is critical to do so to safeguard human life and property. This research deals with evaluating the safety risks of the existing building in the city of Samawah/Iraq and determining the appropriateness of these buildings in terms of safety from fire hazards. Twelve parameters are certified based on the National Fire Protection Association (NFPA2016) code. The concept of giving weight to each criterion was adopted to classify the criteria according to their importance and then conduct an on-site examination of these existing buildings to test the selected criteria. The result indicates a possible fire risk in these buildings due to the lack of compliance with fire safety instructions in the approved codes.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Aug 31 2014
Journal Name
Arabian Journal Of Geosciences
Petroleum system modeling and risk assessments of Ad’daimah oil field: a case study from Mesan Governorate, south Iraq
...Show More Authors

View Publication
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Residual strength and strengthening capacity of reinforced concrete columns subjected to fire exposure by numerical analysis
...Show More Authors
Abstract<p>This study is a numerical investigation of the performance of reinforced concrete (RC) columns after fire exposure. This study aims to investigate the effect of introducing lateral ties and using the RC jacket on improving post-fire behavior of these columns, the effect of the duration of the fire on ultimate load of columns. The analysis was performed through ABAQUS, a 3D – non-linear finite element program. 4 m tall lengthening square RC column with a cross- section of 0.4 m × 0.4 m was used as a test specimen. The RC column was reinforced by 4Ø28 mm longitudinal bars bonded by steel tie bars of Ø10 mm spaced at 400 mm. The firing temperature was increased to 60</p> ... Show More
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Chaos, Solitons &amp; Fractals
Modeling and analysis of an SI1I2R epidemic model with nonlinear incidence and general recovery functions of I1
...Show More Authors

In this paper, we established a mathematical model of an SI1I2R epidemic disease with saturated incidence and general recovery functions of the first disease I1. Considering the basic reproduction number, we obtained conditions for both disease-free and co-existing cases. The equilibrium points local stability is verified by using the Routh-Hurwitz criterion, while for the global stability, we used a suitable Lyapunov function to analyze the endemic spread of the positive equilibrium point. Moreover, we carried out the local bifurcation around both equilibrium points (disease-free and co-existing), where we obtained that the disease-free equilibrium point undergoes a transcritical bifurcation. We conduct numerical simulations that suppo

... Show More
View Publication
Publication Date
Sun Oct 01 2023
Journal Name
Applied Sciences
Multiobjective Optimization of Stereolithography for Dental Bridge Based on a Simple Shape Model Using Taguchi and Response Surface Methods
...Show More Authors

Stereolithography (SLA) has become an essential photocuring 3D printing process for producing parts of complex shapes from photosensitive resin exposed to UV light. The selection of the best printing parameters for good accuracy and surface quality can be further complicated by the geometric complexity of the models. This work introduces multiobjective optimization of SLA printing of 3D dental bridges based on simple CAD objects. The effect of the best combination of a low-cost resin 3D printer’s machine parameter settings, namely normal exposure time, bottom exposure time and bottom layers for less dimensional deviation and surface roughness, was studied. A multiobjective optimization method was utilized, combining the Taguchi me

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Oct 17 2024
Journal Name
South Eastern European Journal Of Public Health
Evaluation of Lifestyle for Women with Breast Cancer
...Show More Authors

Introduction: Breast cancer is a significant global health concern, affecting millions of women worldwide. While advancements in diagnosis and treatment have improved survival rates, the impact of this disease extends beyond physical health. It also significantly influences a woman's lifestyle and overall well-being. Objectives: The current study intends to analyze the lifestyle of breast cancer patients who are receiving therapy or are being followed up at the Oncology Teaching Hospital in Medical City, Baghdad, Iraq. Method: The present study uses a descriptive design with an application of an evaluation approach. A convenience sample of 100 women with breast cancer was selected from the Teaching Oncology Hospital at the Medical C

... Show More
View Publication
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Ergodic Capacity for Evaluation of Mobile System Performance
...Show More Authors

In this research the performance of 5G mobile system is evaluated through the Ergodic capacity metric. Today, in an­­y wireless communication system, many parameters have a significant role on system performance. Three main parameters are of concern here; the source power, number of antennas, and transmitter-receiver distance. User equipment’s (UEs) with equal and non-equal powers are used to evaluate the system performance in addition to using different antenna techniques to demonstrate the differences between SISO, MIMO, and massive MIMO. Using two mobile stations (MS) with different distances from the base station (BS), resulted in showing how using massive MIMO system will improve the performance than the standar

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon Apr 06 2020
Journal Name
Bmc Oral Health
The reliability of surgeons to avoid traumatic insertion of dental implants into high-risk regions: a panoramic radiograph study
...Show More Authors
Abstract<sec> <title>Background

The posterior regions of the jaws usually represent a significant risk for implant surgery. A non-valid assessment of the available bone height may lead to either perforation of the maxillary sinus floor or encroachment of the inferior alveolar nerve and consequently to implant failure. This study aimed to evaluate the reliability of surgeon’s decision in appraising the appropriate implant length, in respect to vital anatomical structures, using panoramic radiographs.

Methods

Only implants that are inserted in relation to the maxillary sinus (MS) or the mandibular canal (MC) were enrolled

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Current Research In Microbiology And Biotechnology
Evaluation for the Cytotoxic Effect of Exotoxin A Produced by Pseudomonas aeruginosa on Mice by using Cytogenetic Parameters
...Show More Authors

This research was conduct to evaluate the cytotoxic effect of exotoxin A (ETA) produced by Pseudomonas aeruginosa on mice in comparison with (phosphate buffer saline (PBS) as a negative control. The effect of the toxin was measured by employing the cytogenetic analysis which included (the mitotic index (MI), chromosomal aberrations (CAs), micronucleus (MN) and sperm abnormalities) parameters. In order to specify the cytotoxic effect of the toxin, three doses of ETA (125, 250 and 500 ng/ml) were used. Results showed that ETA was found to cause a significant decrease in mitotic index (MI) percentage, while significant increase in micronucleus (MN), chromosomal aberrations (CAs) and sperm abnormalities parameters in compression with control wa

... Show More
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref