Circular thin walled structures have wide range of applications. This type of structure is generally exposed to different types of loads, but one of the most important types is a buckling. In this work, the phenomena of buckling was studied by using finite element analysis. The circular thin walled structure in this study is constructed from; cylindrical thin shell strengthen by longitudinal stringers, subjected to pure bending in one plane. In addition, Taguchi method was used to identify the optimum combination set of parameters for enhancement of the critical buckling load value, as well as to investigate the most effective parameter. The parameters that have been analyzed were; cylinder shell thickness, shape of stiffeners section and the number of stiffeners. Furthermore, to verify the contribution of parameters on buckling response, the analysis of variance technique (ANOVA) method was implemented, which gave the contribution weight as percentages. The analysis of results by these two methods showed that the more effective parameter on the critical buckling load was the thickness of cylinder’s shell and the lowest effective was the number of stiffeners The values of parameters that gave the best critical buckling load combination were: 1) the ratio of cylinder’s diameter to thickness of its shell was 133, 2) the ratio of the depth to thickness of stiffeners was1.6, and 3) the number of stiffeners was 12.
BN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15
The aim of the present work to study the effect of changing velocity (Reynold's number) on oxygen cathodic polarization using brass rotating cylinder electrode in 0.1, 0.3 and 0.5N NaCl solutions (PH = 7) at temperatures 40, 50 and 600 C. Cathodic polarization experiments were conducted as a function of electrode rotational speed and concentration.
Retained soft tissue foreign bodies following injuries are frequently seen in the Emergency and Plastic Surgery practice. The patients with such presentations require a watchful and detailed clinical as- sessment to overcome the anticipant possibility of missing them. However, the diagnosis based on the clinical evaluation is usually challenging and needs to be supported by imaging modalities that are suboptimal and may fail in identifying some types of foreign bodies. Owing to that, serious complications such as chronic pain, infection, and delayed wound healing can be faced that necessitate a prompt intervention to halt those detrimental consequences. The classical method of removal is a surgical exploration which is not free of risks.
... Show MoreChromene is considered a fused pyran ring with a benzene ring, which is found in many plants and is part of many important compounds such as anthocyanidins, anthocyanins, catechins, and flavanones. These compounds are included under the headings "flavonoids" and "isoflavonoids." These compounds are well known as bioactive molecules with wide medicinal uses. According to these pharmacokinetic characteristics, many researchers are giving more attention to this type of compound and its derivatives. Many chromene derivatives have been synthesized to study their biological effects for the treatment of many diseases. Furthermore, the researcher displayed wide interest in finding new methods for synthesizing chromene derivatives. These met
... Show MoreHydatid disease is a zoonotic infection caused by Echinococcus species. The cystic form of this infection mostly involves liver and lung. Hydatid disease of the parotid gland even in endemic regions is a very rare entity that may be easily overlooked in daily practice. Herein, I present a case report of a 60-year-old Iraqi female patient who presented with a progressively painless mass in her right parotid. It was diagnosed radiologically as a hydatid cyst and was excised successfully. Histopathologic examination of the resected specimen confirmed the hydatid cyst. This case emphasizes the importance of considering hydatidosis in the differential diagnosis of any parotid mass, especially in endemic countries.
 
... Show MoreLanguage as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show MoreObjective(s): To Evaluate Diabetes self –management among patients in Baghdad City and to compare
between these patients self-management relative to the type of the disease.
Methodology: A descriptive design was conducted in Baghdad city, started from November 16th 2017 to the
end of May 17 th 2018 in order to evaluate Diabetes self-management. Purposive (non-probability) sample,
which was consisted of (120) patients who were diagnosed with D.M. The sample is comprised of (60) patient
with diabetes type I and (60) patient with diabetes type II. It is consisted of (60) male and (60) female. A
questionnaire is constructed for the purpose of the study. It is composed of (42) items. Reliability and validity of
the ques
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More