Preferred Language
Articles
/
alkej-199
A new Cumulative Damage Model for Fatigue Life Prediction under Shot Peening Treatment
...Show More Authors

 Abstract

In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and conservative prediction of fatigue life in comparison with CD and CDM methods. The prediction of the present model gave slightly below the experimental data while the CDM gave overestimate prediction and CD showed strongly underestimates the life of specimens.

 

Keywords: Cumulative fatigue damage, Shot peening, Non-linear model.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Civil Engineering Journal
Behavior of Post-Tensioned Concrete Girders Subject to Partially Strand Damage and Strengthened by NSM-CFRP Composites
...Show More Authors

Studies on the flexural behavior of post-tensioned beams subjected to strand damage and strengthened with near-surface mounted (NSM) technique using carbon fiber-reinforced polymer (CFRP) are limited and fail to examine the effect of CFRP laminates on strand strain and strengthening efficiency systematically. Furthermore, a design approach for UPC structures in existing design guidelines for FRP strengthening techniques is lacking. Hence, the behavior of post-tensioned beams strengthened with NSM-CFRP laminates after partial strand damage is investigated in this study. The testing program consists of seven post-tensioned beams strengthened by NSM-CFRP laminates with three partial strand damage ratios (14.3% symmetrical damage, 14.3%

... Show More
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Period of Creative Behavior for personin in Achieving Entrepreneurial for The new Organaization
...Show More Authors

Experienced organizations in recent years, significant challenges , especially with the spread of economic globalization, making it required to provide new and better through experience , creativity and innovation to achieve the quality and high-quality products of all kinds , in order to achieve the objectives of the study and to answer its questions tested the study in the woolen Industries sector in Baghdad . The study was applied to a sample of 30 people in the senior management and the middle and lower in the company (managers of sections  , and  managers of people , and managers of the units , and office managers ) and for the processing of data and information used several statistical methods and extracted result

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Box and Jenkins use models to predict the numbers of patients with hepatitis Alvairose in Iraq
...Show More Authors

The time series of statistical methods mission followed in this area analysis method, Figuring certain displayed on a certain period of time and analysis we can identify the pattern and the factors affecting them and use them to predict the future of the phenomenon of values, which helps to develop a way of predicting the development of the economic development of sound

The research aims to select the best model to predict the number of infections with hepatitis Alvairose models using Box - Jenkins non-seasonal forecasting in the future.

Data were collected from the Ministry of Health / Department of Health Statistics for the period (from January 2009 until December 2013) was used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 04 2006
Journal Name
Iraqi National Journal Of Chemistry
Synthesis a new series of azo compounds containing oxadiazole rings
...Show More Authors

Some new 2,5-disubsituted-1,3,4-oxadiazole derivatives with azo group were synthesized by known reactions sequence . The structure of the synthesized compounds were confirmed by physical and spectral means .

Publication Date
Wed Jul 01 2020
Journal Name
Plant Archive
A new species of genus stachys L. (Lamiaceae) in Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sat Feb 21 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of a new orthodontic bonding system (Beauty Ortho Bond)
...Show More Authors

Background: The purpose of the current study was to evaluate the efficacy of a new orthodontic bonding system (Beauty Ortho Bond) involving the shear bond strength in dry and wet environments, and adhesion remnant index (ARI) scores evaluation in regard to other bonding systems (Heliosit and Resilience Orthodontic Adhesives). Materials and methods: Sixty defect free extracted premolars were randomly divided into six groups of 10 teeth each, mounted in acrylic resin, three groups for a dry environment and three for a wet one. Shear bond strength test was performed with a cross head speed of 0.5 mm/min, while surfaces of enamel and bracket-adhesive-enamel surfaces were examined with stereomicroscope For ARI scores evaluation. Data were analyz

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2000
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A NEW SPECIES OF LIODONTOMERUS GAH. FROM IRAQ (HYMENOPTERA, TORYMIDAE)
...Show More Authors

A study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.

View Publication Preview PDF
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref