Preferred Language
Articles
/
Sxbf7YsBVTCNdQwCvOWz
Dominant Ideology in Orwell’s Novel “Animal Farm”: A Critical Discourse Analysis of Selected Extracts
...Show More Authors

MRY *Khalid Sh. Sharhan, *Naseer Shukur Hussein, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021

View Publication
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (19)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Jun 27 2019
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
BIODIVERSITY STUDY OF ZOOPLANKTON IN SELECTED BAHR Al-NAJAF DEPRESSION, NAJAF GOVERNORATE, IRAQ
...Show More Authors

The current study aims to assess zooplankton diversity in Bahr Al-Najaf depression using diversity index, specimens were collected from five sites at Bahr Al-Najaf depression, Iraq during April 2017 to March 2018.

 

Forty-eight taxa of zooplankton were identified including 26 taxa to Copepoda, 17 taxa belonged to Rotifers and 5 taxa to Cladocera: Copepoda was the most dominant group (54.2%); Rotifera comprised (35.4%); Cladocera comprised (10.4%).

 

Relative abundance index of zooplankton showed Copepodite and nauplii of Harpacticoid, Hexarthra mira, Daphnia sp., Harpacticoid sp., and Copepodite and nauplii of Cyclops were more abundant. According to the constancy index

... Show More
View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Thu Aug 31 2023
Journal Name
Iraqi Geological Journal
Biostratigraphy of the Jeribe Formation at Selected Sections in Wasit Governorate, Eastern Iraq
...Show More Authors

The present study is concerned with Biostratigraphy of the Early-Middle Miocene outcrops of Jeribe Formation in the Zurbatiyah area, Wasit Governorate, Eastern Iraq. Forty-two Samples collected from Shur Sharin and AL-Hashima outcrop sections. The fossil content is rich in large and small benthic foraminifera; Twenty-one species and genus are identified in this study, in addition to coral, gastropoda, pelecypoda, ostracoda, alge, echinoid and shell fragments. According to the presence of benthic foraminifera, two Biozone have been identified in the Jeribe: Austrotrillina asmariensis-Dendritina rangi Concurrent Zone and Borelis melo curdica range zone.The age of the Formation determined as Early-Middle Miocene depending on these Bioz

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Nov 06 2023
Journal Name
Al- Ustath Journal
INFINITIVAL AND GERUNDIAL CONSTRUCTIONS OF ASPECTUAL VERBS IN SELECTED BRITISH AND AMERICAN NOVELS
...Show More Authors

Abstract Infinitives and gerunds are non-finite verb forms which cannot be indicated by tense, number, or person. The construction of non-finite verbs is intricate because of their nature of meanings, forms, and functions. The major problem is that both infinitival and gerundial complements have identical functions and occupy identical positions in the sentences. Thus, there is a confusion in using an infinitival and gerundial forms after aspectual verbs. The selection of either one of these two forms as complements is controlled syntactically or semantically. Moreover, both forms can be used usually with similar predicate but with neat difference in meaning. In addition, there are problems with controlling the use of aspect, since aspectua

... Show More
Preview PDF