Preferred Language
Articles
/
XBYOKocBVTCNdQwCSzvY
Structural Behavior of High Strength Laced Reinforced Concrete One Way Slab Exposed to Fire Flame
...Show More Authors

In this study, an experimental investigation had conducted for six high strength laced reinforced concrete one-way slabs to discover the behavior of laced structural members after being exposed to fire flame (high temperature). Self-compacted concrete (SCC) had used to achieve easy casting and high strength concrete. All the adopted specimens were identical in their compressive strength of ( , geometric layout 2000 750 150 mm and reinforcement specifics except those of lacing steel content, three ratios of laced steel reinforcement of (0.0021, 0.0040 and 0.0060) were adopted. Three specimens were fired with a steady state temperature of  for two hours duration and then after the specimens were cooled suddenly by spraying water. The simply supported slabs were tested for flexure behavior with two line loads applied in the middle third of the slab (four-point bending test). The average residual percentage of cubic compression strength and splitting tensile strength were 57.5% and 50% respectively. The outcomes indicated that the residual bending strength of the burned slabs with laced ratios (0.0021, 0.004, 0.006) were (72.56, 70.54 and 70.82%) respectively. However; an increase in the deflection was gained to be (11.34, 14.67 and 17.22%) respectively with respect to non-burned specimens.

Crossref
View Publication
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of the of Six Sigma to improve the performance of dentists in albaladeat specialized Dental
...Show More Authors

The research aims at introducing the principles of six sigma and if it had any effect of the dimensions of six sigma to improve the performance of the dentists and the availability of an appropriate environment in the center Specialist respondent to the application of six sigma principles and how to adopt Specialized Center under the dimensions of the six sigma and if there informed enough with the management methodology six sigma, and if you can adopt six sigma as one of the entrances to reduce medical errors. So  Search creating six sigma five dimensions and are (the commitment and support of senior management, the focus  on the patient, continuous improvement, training and civil, and infrastructure) as a variable int

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 1996
Journal Name
Unpublished
Temporomandibular disorders in pretreatment orthodontic patients as related to malocclusion
...Show More Authors

Temporomandibular disorders (TMDs) were investigated in 143 pretreatment orthodontic patients (43 males and 102 females) whose age ranged between 10-25 years at the College of Dentistry, University of Baghdad, Iraq. The study was undertaken to elucidate the prevalence and severity of TMDs in malocclusion patients and to defme the relationships between malocclusion and TMDs. The clinical signs and subjective symptoms were recorded according to the principles introduced by Helkimo (1974b). Subjective symptoms were reported by 65.7% of the patients with 22.40/0 described as severe, and the most common symptoms were TMJ sounds and feeling offatigue. Clinical signs were observed in 81.8% of the sample with 22.4 and 6.3% described as moderate and

... Show More
Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Fri Jan 01 2010
Journal Name
Int. J. Adv. Comp. Techn.
Adding PC Connectivity to the MTS-88 Microcomputer Teaching System
...Show More Authors

The MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as

... Show More
Publication Date
Wed Jan 21 2026
Journal Name
Journal Of The College Of Law /al-nahrain University
The extent to which universal jurisdiction is affected by immunity
...Show More Authors

View Publication
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
A New Hybrid Meta-Heuristics Algorithms to Solve APP Problems
...Show More Authors
Abstract<p>In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.</p>
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jan 08 2025
Journal Name
Interventional Cardiology
Intravascular Foreign Bodies Retrieval: Navigating Differences From Childhood to Adulthood
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Ira International Journal Of Education And Multidisciplinary Studies (issn 2455–2526)
Inappropriateness in Iraqi EFL Learners’ E-mail Requests to Professor
...Show More Authors

<div><p><em>This study investigates the use of the speech act of request by </em><em>Iraqi EFL (English as a foreign language) learners </em><em>in student-professor e-mail communication. It aims to examine request strategies and internal modifications in academic requests in e-mail. There has been little investigation of the issue of an academic request made by Arab EFL learners to a higher status person via an authentic data. Thus, this study intends to provide more investigation of the strategies and internal modifiers that are produced by Iraqi EFL learners when they interact with their professors via e-mail. However, this study adapts the CCSARP (cross-cultural speech act realization pr

... Show More
View Publication
Crossref (1)
Crossref