In this paper, first we refom1Ulated the finite element model
(FEM) into a neural network structure using a simple two - dimensional problem. The structure of this neural network is described
, followed by its application to solving the forward and inverse problems. This model is then extended to the general case and the advantages and di sadvantages of this approach are descri bed along with an analysis of the sensi tivity of
... Show MoreSolid state blue laser source is a solid state laser include generation of IR laser light 1064 nm and companied with other wavelength 810 nm that invented from other active medium (Tm:ZBLAN) and non-linear crystal (CLBO) are used to generate fourth harmonic of the resultant wavelength 1874 nm that is blue laser light of 460nm. Several optical component have been designed by multilayer dielectric structure and anti reflection coating analysis. By using MATLAB soft ware, the simulation done and used the following non linear material (ZrO2, HfO2, MgO, SiO, Ta2O5 CaF2) and other linear material (ZnO, MgF2, GaAs, AlAs, BaF2, LiF, TiO2) as coating material. The result showed that as more quarter wave layers are added to the structure, the refl
... Show MoreTwo dimensional meso-scale concrete modeling was used in finite element analysis of plain concrete beam subjected to bending. The plane stress 4-noded quadrilateral elements were utilized to model coarse aggregate, cement mortar. The effect of aggregate fraction distribution, and pores percent of the total area – resulting from air voids entrapped in concrete during placement on the behavior of plain concrete beam in flexural was detected. Aggregate size fractions were randomly distributed across the profile area of the beam. Extended Finite Element Method (XFEM) was employed to treat the discontinuities problems result from double phases of concrete and cracking that faced during the finite element analysis of concrete beam. Crac
... Show MoreAlterations of trace element concentrations adversely affect biological processes and could promote carcinogenesis. Trace element deficiency or excess is implicated in the development or progression of some cancers like colorectal cancer. The aim of the present study was to compare the serum copper (Cu) and zinc (Zn) concentrations in patients with colorectal cancer from Iraqi male patient with those of healthy subjects. During the period of March 2015 until august 2015, a total of 25 patients with metastatic colon cancer and 20 healthy volunteers were enrolled from the Al-Kadhimia Teaching Hospital after the diagnosis using a histopathological examination for the malignant tumor; their age was between (38-60) years. Higher levels o
... Show MoreAlterations of trace element concentrations adversely affect biological processes and could promote carcinogenesis. Trace element deficiency or excess is implicated in the development or progression of some cancers like colorectal cancer. The aim of the present study was to compare the serum copper (Cu) and zinc (Zn) concentrations in patients with colorectal cancer from Iraqi male patient with those of healthy subjects. During the period of March 2015 until august 2015, a total of 25 patients with metastatic colon cancer and 20 healthy volunteers were enrolled from the Al-Kadhimia Teaching Hospital after the diagnosis using a histopathological examination for the malignant tumor; their age was between (38-60) years. Higher
... Show MoreAn Intelligent Internet of Things network based on an Artificial Intelligent System, can substantially control and reduce the congestion effects in the network. In this paper, an artificial intelligent system is proposed for eliminating the congestion effects in traffic load in an Intelligent Internet of Things network based on a deep learning Convolutional Recurrent Neural Network with a modified Element-wise Attention Gate. The invisible layer of the modified Element-wise Attention Gate structure has self-feedback to increase its long short-term memory. The artificial intelligent system is implemented for next step ahead traffic estimation and clustering the network. In the proposed architecture, each sensing node is adaptive and able to
... Show MoreThe problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all
... Show MoreThe study dealt with measuring the impact of the availability of each of the content elements of the interaction, electronic services, and information on the evaluation of the users of the government website for its effectiveness in terms of the site’s functions and for measuring the site’s ability to present the organization’s tasks to customer groups.
Authority is concerned with measuring the confidence of customers in the content of the site, and in the organization as a whole. Validity is related to measuring the effectiveness of employing the site’s content to achieve the goal of its creation and in communicating with customers. Availability It is for measuring the ease of use of the site. The relevance, which means
... Show MoreAn approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show More