Preferred Language
Articles
/
Mhh03JQBVTCNdQwC0iFH
A Numerical Study of Concrete Composite Circular Columns encased with GFRP I-Section using the Finite Element Method
...Show More Authors

This paper presents ABAQUS simulations of fully encased composite columns, aiming to examine the behavior of a composite column system under different load conditions, namely concentric, eccentric with 25 mm eccentricity, and flexural loading. The numerical results are validated with the experimental results obtained for columns subjected to static loads. A new loading condition with a 50 mm eccentricity is simulated to obtain additional data points for constructing the interaction diagram of load-moment curves, in an attempt to investigate the load-moment behavior for a reference column with a steel I-section and a column with a GFRP I-section. The result comparison shows that the experimental data align closely with the simulation results regarding the ultimate strength, deformation, and failure modes, thereby validating the accuracy of the considered models. On the other hand, the numerical results of the column specimens under 50 mm eccentric load demonstrated that, in that case, the ultimate load of the columns decreased. The capacity of the reference column, a column with steel I-section, and a column with GFRP I-section decreased to 67%, 63%, and 64%, respectively compared with the columns tested under concentric load. The analytical investigation predicted the load-carrying capacity and bending moment capacity of the specimens with good accuracy. Based on the experimental curves, and the high strength found in the specimens that use the steel I- and GFRP I-sections, a good agreement between the numerical simulation and the experimental results was noticed.

Scopus Crossref
View Publication
Publication Date
Mon Feb 13 2023
Journal Name
International Journal Of Professional Business Review
The Reality of Local Investment in Iraq and Prospects for its Development: a Case Study in the Baghdad Investment Commission
...Show More Authors

Purpose: This research is to identify the most important challenges for the local investment commissions and to develop solutions and proposals to encourage local and foreign investment in local governments in Iraq (the Iraqi provinces are irregular in the region).   Theoretical Framework: This research suggests a conceptual framework for the local investment commissions in order to solve their problems, the most important of which was to identify the most critical challenges which are facing the Baghdad Investment Commission BIC and how to overcome them.   Design/The methodology approach: Research involved a mixed-methods approach through two stages. During the first stage, the researcher gathered quantitative data from all inves

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
The Stories of Proverbs in the Holy Qur’an, Prophet’s Hadith, and Arabs’ Sayings: A Literary Study: مسلم عبيد فندي الرشيدي
...Show More Authors

The Arab realized that proverbs and their stories had a great literary and linguistic significance, accordingly, they collected them from their sources and wrote them down. Thus, researchers went in studying them in different directions. The aim of the present research is thus to study the stories of proverbs in the Holy Qur’an, Prophet’s hadiths, and in the sayings of Arabs. Such a study helps to show the extent of the relevance of their stories to the proverbs, their literary values, the points of convergence between them and what they highlight, and the extent of their proximity to reality. It further helps to determine the factors that contributed to the transformation of Quranic verses, Prophet’s hadiths, and some phrases of s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
''The use of factor analysis to identify the leading factors to high blood pressure.''A field study in Baghdad hospitals
...Show More Authors

Abstract :

    In view of the fact that high blood pressure is one of the serious human diseases that a person can get without having to feel them, which is caused by many reasons therefore it became necessary to do research in this subject and to express these many factors by specific causes through studying it using (factor analysis).

  So the researcher got to the five factors that explains only 71% of the total variation in this phenomenon is the subject of the research, where ((overweight)) and ((alcohol in abundance)) and ((smoking)) and ((lack of exercise)) are the reasons that influential the most in the incidence of this disease.

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Civil And Environmental Engineering
Constructing a Corrected Stations Network Using Some Geomatic Techniques
...Show More Authors
Abstract<p>The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R<sup>2</sup>) is 0.077 m observed in Northing. While in</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Framework for Predicting Airfare Prices Using Machine Learning
...Show More Authors

Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Soft Computing And Computer Applications
Enhancing Image Classification Using a Convolutional Neural Network Model
...Show More Authors

In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.

... Show More
View Publication
Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref