Preferred Language
Articles
/
b4aBrYYBIXToZYALJqO9
Behavior of One-Way Reinforced Concrete Slabs with Polystyrene Embedded Arched Blocks
...Show More Authors

This study presents experimental and numerical investigations on seven one-way, reinforced concrete (RC) slabs with a new technique of slab weight reduction using polystyrene-embedded arched blocks (PEABs). All slabs had the same dimensions, steel reinforcement, and concrete compressive strength. One of these slabs was a solid slab, which was taken as a control slab, while the other six slabs were cast with PEABs. The main variables were the ratio of the length of the PEABs to the length of the slab (lp/L) and the ratio of the height of the PEABs to the total slab depth (hP/H). The minimum decrease in the ultimate load capacity was about 6% with a minimum reduction in the slab weight of 15%. In contrast, the maximum decrease in the ultimate load capacity was about 24% with a maximum reduction in the slab weight of 40%. Moreover, the mode of failure changed from flexure to shear failure, especially for those slabs with an lP/L ratio equal to one. The geometric and material non-linearity was adopted in the proposed finite element (FE) model to simulate the slabs with PEABs using Abaqus software. Good agreement was obtained between the developed FE and experimental results.

Scopus Clarivate Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Hybrid Techniques with Support Vector Machine for Improving Artifact Ultrasound Images
...Show More Authors

     The most common artifacts in ultrasound (US) imaging are reverberation and comet-tail. These are multiple reflection echoing the interface that causing them, and result in ghost echoes in the ultrasound image. A method to reduce these unwanted artifacts using a Otsu thresholding to find region of interest (reflection echoes) and output applied to median filter to remove noise. The developed method significantly reduced the magnitude of the reverberation and comet-tail artifacts. Support Vector Machine (SVM) algorithm is most suitable for hyperplane differentiate. For that, we use image enhancement, extraction of feature, region of interest, Otsu thresholding, and finally classification image datasets to normal or abnormal image.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
On Solving Singular Multi Point Boundary Value Problems with Nonlocal Condition
...Show More Authors

In this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.

View Publication Preview PDF
Publication Date
Thu Apr 15 2021
Journal Name
Biochem. Cell. Arch.
CYTOKINES SERUM PROFILE IMMUNOSUPPRESSANT BALB/C MICE INFECTED WITH CRYPTOSPORIDIUM PARVUM
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Communications In Computer And Information Science
Audio Compression Using Transform Coding with LZW and Double Shift Coding
...Show More Authors

Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Mar 27 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Lipid Profile and Fasting Blood Sugar Analysis in Patients with Cholelithiasis
...Show More Authors

Cholelithiasis is one of the commonest surgical problems and one of the most common gastrointestinal diseases throughout the world but its pathogenesis remains unclear. Many theories have been proposed forward to explain the mechanism of stone formation. It is not fully clear if symptomatic gallstone disease is associated with a specific pattern of some biochemical abnormalities, as lipid profile and fasting blood sugar in serum of patients.

This study was designed to estimate lipid profile and fasting blood sugar in the sera of patients with cholelithiasis in comparison with normal individuals (control).

In this study, 104(male=16, female=88) were symptomatic gallstone patients (aged 42.79± 12.18 years), and 38(male=6

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2009
Journal Name
Iraqi J Comm Med
Clinical Presentations and CT-Scan findings in children with Cerebral Palsy
...Show More Authors

Background: Cerebral palsy is non-progressive disorder of posture or movement due to a lesion of the developing brain. It is the commonest physical disability in childhood. Objective: To study the clinical, neurological abnormalities, prevalence of convulsion (epilepsy) & to asses the value of CT scans of brain in patients with cerebral palsy.

Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Statistical testing mediation in structural equations models variables with practical application
...Show More Authors

In this research was the study of a single method of estimation and testing parameters mediating variables (Mediation) in a specimen structural equations SEM a bootstrap method, for the purpose of application of the integrated survey of the situation Marital data and health mirror Iraqi (I-WISH) for the year 2011 from the Ministry of Planning - device Central Bureau of Statistics, and applied to the appropriate data from the terms of the data to a form of structural equation SEM using factor analysis affirmative (Confirmatory Factor analysis) CFA As a way to see the match variables that make up the model, and after confirming the model matching or suitability are having the effect of variables mediation in the model tested by the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Mathematics In Operational Research
A single server fuzzy queues with priority and unequal service rates
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
...Show More Authors

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref