Preferred Language
Articles
/
ehZPGocBVTCNdQwCATc8
Stability and Seismic Performance of Tall Steel Structures with Hybrid Energy Absorbers Including P-Delta Effect
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Study the Relationship between Beta Decay Stability of Nuclide and its Shape for Some even-even Isobars
...Show More Authors

The aim of this work is to learn the relationship of the stability of (β) emitter isobars with their shape for some isobaric elements with even mass number (A=152 - 162). To reach this goal firstly the most stable isobar have been determined by plotting mass parabola (plotting the binding energy (B.E) as a function of the atomic number (Z)) for each isobaric family. Then three-dimensional representation graphics for each nucleus in these isobaric families have been plotted to illustrate the deformation in the shape of a nucleus. These three-dimensional representation graphics prepared by calculating the values of semi-axis minor (a), major (b) and (c) ellipsoid axis’s. Our results show that the shape of nuclides which is represented the

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
ZnO: MWCNT optical hybrid filter a promising nanomaterial for wastewater treatment and antimicrobial applications
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s

... Show More
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Structural Engineering
Standard Pushout Tests and Design Rules for a Bolted–Welded Hybrid Demountable Shear Connector
...Show More Authors

A bolted–welded hybrid demountable shear connector for use in deconstructable steel–concrete composite buildings and bridges was proposed. The hybrid connector consisted of a partially threaded stud, which was welded on the flange of a steel section, and a machined steel tube with compatible geometry, which was bolted on the stud. Four standard pushout tests according to Eurocode 4 were carried out to assess the shear performance of the hybrid connector. The experimental results show that the initial stiffness, shear resistance, and slip capacity of the proposed connector were higher than those of traditional welded studs. The hybrid connector was a ductile connector, according to Eurocode 4, with slip capacity higher than 6 mm. A nonli

... Show More
View Publication
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Craniofacial Surgery
Does Mixed Conventional/Piezosurgery Implant Site Preparation Affect Implant Stability?
...Show More Authors

The aim of this study was to compare the effect of conventional implant site preparation technique and a combination of conventional/piezosurgery preparation on implant stability measured at different time intervals, insertion torque, and preparation time. A randomized controlled study was designed, it included 26 patients who received 54 dental implants randomly assigned to 2 groups; in the control group, implants were installed after conventional preparation with drills whereas the study group received implants after mixed conventional/piezosurgery preparation. The outcome variables included: implant stability measured immediately after implant insertion, at 8 weeks and 16 weeks postoperatively, insertion torque and preparation time. All

... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
The Quest for Stability in Willa Cathar’s Novle My Antonia
...Show More Authors

    Willa Cather (1873-1947) sought to capture the gradation of human emotion through carefully selected descriptive and narrative touches and firmly controlled management of dramatic scenes, situations, dialogue, and point of view. Cather’s novels and stories drew increasingly upon her personal experiences and memories.

    The old settlement of Virginia and the new lands of Nebraska formed the bedding ground for Willa Cather’s talents; so did the layers of memory she found across the North American continent, from New Mexico to Canada. She saw the full-blooded European immigrants, Czechs and Swedes, plowing the unbroken land, on the way up from peasants to proprietors.

  &nbsp

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
Recognition of Upper Limb Movements Based on Hybrid EEG and EMG Signals for Human-Robot Interaction
...Show More Authors

Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that usin

... Show More
View Publication
Crossref
Publication Date
Tue Jun 22 2021
Journal Name
Expert Systems
Hybrid intelligent technology for plant health using the fusion of evolutionary optimization and deep neural networks
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of Engineering
Experimental Study and Analysis on Degradation of Oily Sludge from Process Equipment by Continuous Hybrid Treatment
...Show More Authors

It is well known that petroleum refineries are considered the largest generator of oily sludge which may cause serious threats to the environment if disposed of without treatment. Throughout the present research, it can be said that a hybrid process including ultrasonic treatment coupled with froth floatation has been shown as a green efficient treatment of oily sludge waste from the bottom of crude oil tanks in Al-Daura refinery and able to get high yield of base oil recovery which is 65% at the optimum operating conditions (treatment time = 30 min, ultrasonic wave amplitude = 60 micron, and (solvent: oily sludge) ratio = 4). Experimental results showed that 83% of the solvent used was recovered meanwhile the main water

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (29)
Crossref (15)
Scopus Crossref