Preferred Language
Articles
/
NYYuqYYBIXToZYALzaOs
Non-Smooth Behavior of Reinforced Concrete Beam Using Extended Finite Element Method
...Show More Authors

Flexure members such as reinforced concrete (RC) simply supported beams subjected to two-point loading were analyzed numerically. The Extended Finite Element Method (XFEM) was employed for the treatment the non-smooth h behaviour such as discontinuities and singularities. This method is a powerful technique used for the analysis of the fracture process and crack propagation in concrete. Concrete is a heterogeneous material that consists of coarse aggregate, cement mortar and air voids distributed in the cement paste. Numerical modeling of concrete comprises a two-scale model, using mesoscale and macroscale numerical models. The effectiveness and validity of the Meso-Scale Approach (MSA) in modeling of the reinforced concrete beams with minimum reinforcement was studied.  ABAQUS program was utilized for Finite Element (FE) modeling and analysis of the beams. On the other hand, mesoscale modeling of concrete constituents was executed with the aid of ABAQUS PYTHON language and programing using excel sheets. The concrete beams under flexure were experimentally investigated as well as by the numerical analysis. The comparison between experimental and numerical results showed that the mesoscale model gives a better indication for representing the concrete models in the numerical approach and a more appropriate result when compared with the experimental results.

Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
International Educational Scientific Research Journal
EFFICIENTMETHODSOFIRISRECOGNITION
...Show More Authors

Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit

... Show More
Preview PDF
Publication Date
Tue Jan 31 2012
Journal Name
Journal Of Engineering
Adsorption Study of Hydrodesulphurization Catalyst
...Show More Authors

Physical and chemical adsorption analyses were carried out by nitrogen gas using ASTM apparatus at 77 K and hydrogen gas using volumetric apparatus at room temperature, respectively. These analyses were used to determine the effect of coke deposition and poisoning metal on surface area, pore size distribution, and metal surface area of fresh and spent hydrodesulphurization catalyst Co-Mo\Al2O3 . Samples of catalyst (fresh and spent) used in this study are taken from AL-Dura refinery. The results of physical adsorption shows that surface area of spent catalyst reduced to third compare with fresh catalyst and these catalysts exhibit behavior of type four according to BET classification ,so, the pores of these samples are cylindrical, an

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Scientific And Technical Research
Topological Generalizations of Rough Concepts
...Show More Authors

The importance of topology as a tool in preference theory is what motivates this study in which we characterize topologies generating by digraphs. In this paper, we generalized the notions of rough set concepts using two topological structures generated by out (resp. in)-degree sets of vertices on general digraph. New types of topological rough sets are initiated and studied using new types of topological sets. Some properties of topological rough approximations are studied by many propositions.

Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cubic Ideals of TM-algebras
...Show More Authors

For the generality of fuzzy ideals in TM-algebra, a cubic ideal in this algebra has been studied, such as cubic ideals and cubic T-ideals. Some properties of these ideals are investigated. Also, we show that the cubic T-ideal is a cubic ideal, but the converse is not generally valid. In addition, a cubic sub-algebra is defined, and new relations between the level subset and a cubic sub-algebra are discussed. After that, cubic ideals and cubic T-ideals under homomorphism are studied, and the image (pre-image) of cubic T-ideals is discussed. Finally, the Cartesian product of cubic ideals in Cartesian product TM-algebras is given. We proved that the product of two cubic ideals of the Cartesian product of two TM-algebras is also a cubic ideal.

Publication Date
Wed Mar 15 2023
Journal Name
Al-adab Journal
Models of Phonological Loanword Adaptation
...Show More Authors

Borrowing in linguistics refers to the process whereby a group of speakers incorporates certain foreign linguistic components into their home language via a process known as linguistic borrowing. The process by which these foreign linguistic elements, known as loanwords, go through phonological, morphological, or semantic changes in order for them to fit the grammar of the recipient language is referred to as loanword adaptation. Loanwords go through these changes in order for them to become compatible with the grammar of the recipient language. One of the most divisive topics in loanword phonology is whether adaptations occur at the phonemic or phonetic levels, and current literature distinguishes three primary viewpoints: nativiza

... Show More
View Publication
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
Reflective Judgment of University Students
...Show More Authors

This research aims at identifying the level of Reflective Judgment for University students in term of gender and stage. To this end, the researcher used Khaleel's scale (2016) for the Reflective Judgment. The scale was administered to the sample of the study which is (200) male and female level first-fourth university students. The results have shown that university students are on the level five of the Reflective Judgment, and the first-stage students have reflective judgment more than fourth-stage students. In the light of these results, the researcher has come with a number of recommendations and suggestions.     

View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Biological peculiarities of Leucozonella retteri
...Show More Authors

The aim of the research is to study the biology, life cycles, distribution and structure of the reproductive organ of Leucozonella retteri in natural conditions. Zoological and malacological methods are used in the work. The collection of the material was carried out according to A.A. Shileiko method. According to the results of the conducted studies, the differences between Leucozonella retteri and other species in the structure of the reproductive organ were manifested in the following. The lower part of the sperm is straight, the ovary is slightly curved. The paw pad is 8, located in 4x2 positions. The stylophore is large spherical. The vagina is cylindrical, its length is 5-6 times greater than the width. The penis is large and conve

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Review of Software Watermarking
...Show More Authors

The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Iraqi Journal Of Science
Diagnoses System of Varicose Disease
...Show More Authors

The diagnoses system of varicose disease has a good level of performance due to the complexity and uniqueness in patterns of vein of the leg. In addition, the patterns of vein are internal of the body, and its features are hard to duplicate, this reason make this method not easy to fake, and thus make it contains of a good features for varicose disease diagnoses. The proposed system used more than one type of algorithms to produce diagnoses system of varicose disease with high accuracy, in addition, this multi-algorithm technique based on veins as a factor to recognize varicose infection. The obtained results indicate that the design of varicose diagnoses system by applying multi- algorithms (Naïve Bayes and Back-Propagation) produced new

... Show More
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Derivable Maps of Prime Rings
...Show More Authors

Our active aim in this paper is to prove the following Let Ŕ be a ring having an
idempotent element e(e  0,e 1) . Suppose that R is a subring of Ŕ which
satisfies:
(i) eR  R and Re  R .
(ii) xR  0 implies x  0 .
(iii ) eRx  0 implies x  0( and hence Rx  0 implies x  0) .
(iv) exeR(1 e)  0 implies exe  0 .
If D is a derivable map of R satisfying D(R )  R ;i, j 1,2. ij ij Then D is
additive. This extend Daif's result to the case R need not contain any non-zero
idempotent element.

View Publication Preview PDF