Two novel demountable shear connectors for precast steel-concrete composite bridges are presented. The connectors use high-strength steel bolts, which are fastened to the steel beam with the aid of a special locking configuration that prevents slip of bolts within their holes. Moreover, the connectors promote accelerated construction and overcome typical construction tolerances issues of precast structures. Most importantly, the connectors allow bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (3) steel beams can be replaced, while precast
... Show MoreRecovery of time-dependent thermal conductivity has been numerically investigated. The problem of identification in one-dimensional heat equation from Cauchy boundary data and mass/energy specification has been considered. The inverse problem recasted as a nonlinear optimization problem. The regularized least-squares functional is minimised through lsqnonlin routine from MATLAB to retrieve the unknown coefficient. We investigate the stability and accuracy for numerical solution for two examples with various noise level and regularization parameter.
In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show More
It is considered as one of the statistical methods used to describe and estimate the relationship between randomness (Y) and explanatory variables (X). The second is the homogeneity of the variance, in which the dependent variable is a binary response takes two values (One when a specific event occurred and zero when that event did not happen) such as (injured and uninjured, married and unmarried) and that a large number of explanatory variables led to the emergence of the problem of linear multiplicity that makes the estimates inaccurate, and the method of greatest possibility and the method of declination of the letter was used in estimating A double-response logistic regression model by adopting the Jackna
... Show MoreAutomatic license plate recognition (ALPR) used for many applications especially in security applications, including border control. However, more accurate and language-independent techniques are still needed. This work provides a new approach to identifying Arabic license plates in different formats, colors, and even including English characters. Numbers, characters, and layouts with either 1-line or 2-line layouts are presented. For the test, we intend to use Iraqi license plates as there is a wide range of license plate styles written in Arabic, Kurdish, and English/Arabic languages, each different in style and color. This variety makes it difficult for recent traditional license plate recognition systems and algorithms to recogn
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThe inhibitory effect of acetone, ethanol, and aqueous extracts of ten medicinal plants on β-lactamase from Staphylococcus sciuri and Klebsiella pneumoniae was investigated in vitro by starch-iodine agar plate method. The results revealed the success of starch-iodine method for the detection of the inhibition of β-lactamase activity by the various extracts of each individual plant. The acetone extracts of Catharanthus roseus, Eucalyptus camaldulensis, and Schinus terebinthifolius induced an inhibitory effect on β-lactamase from Staphylococcus sciuri. On the other hand, acetone extracts from only Eucalyptus camaldulensis, and Schinus
... Show More