Preferred Language
Articles
/
MYYsqYYBIXToZYALaaOf
Extended Finite Element Analysis of Reinforced Concrete Beams Using Meso-Scale Modeling
...Show More Authors

Four simply supported reinforced concrete (RC) beams were test experimentaly and analyzed using the extended finite element method (XFEM). This method is used to treat the discontinuities resulting from the fracture process and crack propagation in that occur in concrete. The Meso-Scale Approach (MSA) used to model concrete as a heterogenous material consists of a three-phasic material (coarse aggregate, mortar, and air voids in the cement paste). The coarse aggregate that was used in the casting of these beams rounded and crashed aggregate shape with maximum size of 20 mm. The compressive strength used in these beams is equal to 17 MPa and 34 MPa, respectively. These RC beams are designed to fail due to flexure when subjected to load as a two-point loading. To model the coarse aggregate realistically, the aggregate must distributed randomly according to the gradient and amount actually used in the mix design. This property is not found in the ABAQUS program that resulted in the use of an alternate program to represent the aggregate randomly. Next, the random representation of the aggregate were transfered to the ABAQUS program by using commands and instructions that the program can understand, to draw as a sketch. The comparison between experimental and numerical results showed that the XFEM is a good method used to simulate the non-smooth behavior in RC beams such as discontinuitiy and singularity. While a mesoscale model can be simulated the non-homogeneity in the concrete.

Crossref
Publication Date
Mon Aug 25 2025
Journal Name
مجلة كلية التربية
A Multi-modal Critical Discourse Analysis of Selected English Political Cartoons تحليل خطاب نقدي متعدد الوسائط لرسوم كاريكاتورية سياسية إنجليزية مختارة
...Show More Authors

This study analyses six political cartoons selected based on their relevance to current Iraqi political issues, specifically the period between 2005 and 2015, from American online newspapers (calgecartooms.com). The selection criteria included the cartoons' satirical elements, visual rhetoric, and their ability to engage with themes such as power dynamics, social issues, and public opinion. It sheds light on how these cartoons can function as mediators of meanings between the cartoonists and the readers. The data is examined using multimodal discourse analysis (MDA), which combines language study with the analysis of other visual elements, like colors, gestures, and images, to understand meaning (O’Halloran et al., 2011). The Visual Socia

... Show More
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Analytical Methods In Environmental Chemistry Journal
Design a continuous microfluidic flow cell for turbidimetric-flow injection technology: A new approach for routine analysis of active pharmaceutical formulations
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Clinical And Experimental Dentistry
Prevalence of periapical lesions in non-endodontically and endodontically treated teeth in an urban Iraqi adult subpopulation: A retrospective CBCT analysis
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Crossref
Publication Date
Tue May 17 2022
Journal Name
Egyptian Journal Of Chemistry
Determination of Ferrous Ion in Pure & Pharmaceutical Preparation by Continuous Flow Injection Analysis Via Turbidmetric Utilizing NAG-4SX3-3D Analyzer
...Show More Authors

Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
Bifurcation and Stability Analysis of Stagnation Point for Fluid Flow in an Inclined Channel with Inclined Magnetic Field for Peristaltic Transport
...Show More Authors

Streamlined peristaltic transport patterns, bifurcations of equilibrium points, and effects of an inclined magnetic field and channel are shown in this study. The incompressible fluid has been the subject of the model's investigation. The Reynolds values for evanescence and an infinite wavelength are used to constrain the flow while it is being studied in a slanted channel with a slanted magnetic field. The topologies over their domestic and cosmopolitan bifurcations are investigated for the outcomes, and notion of the dynamical system are employed. The Mathematica software is used to solve the nonlinear autonomous system. The flow is found to have three different flow distributions namely augmented, trapping and backward flow. Outc

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Ceramics International
Surface structural features and optical analysis of nanostructured Cu-oxide thin film coatings coated via the sol-gel dip coating method
...Show More Authors

View Publication
Scopus (37)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 27 2022
Journal Name
2022 3rd Information Technology To Enhance E-learning And Other Application (it-ela)
Diabetes Prediction Using Machine Learning
...Show More Authors

Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,

... Show More
View Publication
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF