Preferred Language
Articles
/
ehfS3JEBVTCNdQwCEJvp
Standard Pushout Tests and Design Rules for a Bolted–Welded Hybrid Demountable Shear Connector
...Show More Authors

A bolted–welded hybrid demountable shear connector for use in deconstructable steel–concrete composite buildings and bridges was proposed. The hybrid connector consisted of a partially threaded stud, which was welded on the flange of a steel section, and a machined steel tube with compatible geometry, which was bolted on the stud. Four standard pushout tests according to Eurocode 4 were carried out to assess the shear performance of the hybrid connector. The experimental results show that the initial stiffness, shear resistance, and slip capacity of the proposed connector were higher than those of traditional welded studs. The hybrid connector was a ductile connector, according to Eurocode 4, with slip capacity higher than 6 mm. A nonlinear finite-element model was calibrated against the pushout tests and found capable of reproducing the experimental behavior with good agreement. The verified finite-element model was then used to conduct a series of parametric studies in order to assess the effect of infilled grout, concrete slab strength, stud diameter, stud tensile strength, tube thickness, and tube tensile strength on the shear resistance and stiffness of the hybrid connector. Based on the experimental and numerical results, a design equation is proposed for the prediction of the shear resistance of the novel connector.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Language Teaching And Research
Emotional Blackmail in Breaking Bad Series: A Pragma-Stylistic Study
...Show More Authors

Although language research has focused on blackmail in general, less attention has been paid to emotional blackmail. To date, researchers could not locate any literature that examines emotional blackmail from a linguistic standpoint. The current study is intended to fill this gap by scrutinizing emotional blackmail from a pragma-stylistic point of view by examining the style of the characters in selected episodes extracted from the American Breaking Bad series. To carry out the study, an eclectic model comprising kinds of emotional blackmailers by Forward and Frazier (1997), Searles’ speech acts (1979), Grice’s maxims (1975), Brown and Levinson’s politeness (1987), Culpeper’s impoliteness (1996), and Simpson’s stylistic le

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
2013 International Conference On Research And Innovation In Information Systems (icriis)
A review of e-service quality dimensions in user satisfaction
...Show More Authors

View Publication
Scopus (11)
Crossref (5)
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Anonymous Identity of Forced Migrants: A Post-Colonial Study
...Show More Authors

Colonialism invades the Third World countries, physically and psychologically. This article exposes but sample of the physical and psychological consequences of colonialism. The Beekeeper of Aleppo (2019) by the British novelist, Christy Lefteri is a typical novel to diagnose the harsh circumstances of individuals within and after the disaster. Since it depicts characters from Asian countries, it would be a best representative for all Asian people who suffer colonialism. Migration toward anonymity is the mere option for the colonized people. Aftermath, they experience displacement, trauma, and the loss of identity.

View Publication
Crossref
Publication Date
Tue Jul 31 2018
Journal Name
Revue Académique De La Recherche Juridique
Jurisdiction in the Professional Football Player Contract – A Comparative Study
...Show More Authors

Is no longer a football player looks to sport as a means of entertainment and physical development. But become see as part of The economic and is getting in return for the effort of، Through a contract with a club to organize the activity which is called a contract of professional, This contract is similar to the rest of the contracts in terms of problems and dispute that arise during the implementation or after it ends because of the nature of sports to such disputes and privacy being subject to special rules (regulations, national and international professional) required that subject to judicial bodies private mission confined settle sports disputes these entities and is affiliated unions legal committees and the court of arbitration for

... Show More
View Publication
Publication Date
Wed Sep 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Simulation of a Self-Balancing Platform on the Mobile Car
...Show More Authors

        In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, industry. This paper introduced the simulated model of a proposed self-balancing platform that described the self–balancing attitude in (X-axis, Y-axis, or both axis) under the influence of road disturbance. To simulate the self-balanced platform's performance during the tilt, an integration between Solidworks, Simscape, and Simulink toolboxes in MATLAB was used. The platform's dynamic model was drawn in SolidWorks and exported as a STEP file used in the Simscape Multibody environment. The system is controlled using the proportional-integral-derivative (PID) co

... Show More
Preview PDF
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
La femme fugitive dans ‘’A une passante’’ de Charles Baudelaire
...Show More Authors

The main subject of this poem is a chance meeting between Baudelaire and unknown beautiful lady.  Her presence represents the far-fetched, magnificent beauty. This beauty forms an aspect of idealism that takes its real existence and disappears immediately.

 

This emotional poem deals with the continuous despair that dates back to the Romantic age where it was a key topic; the passing woman embodies destiny. All this comes from constant experience and mad love through the poet’s view to a woman paving the way toward the unknown. Baudelaire, however, noticed this unknown through a passer-by that reflected the real and magical image of this unk

... Show More
View Publication Preview PDF
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Single Particle Level Density in a Harmonic – Oscillator Potential Well
...Show More Authors

The purpose of this paper is to study the properties of the
partial level density ( ) l g and the total level density g ( ),
numerically obtained as a l sum of ( ) l g up to 34 max l  , for
a Harmonic – Oscillator potential well. This method applied the
quantum – mechanical phase shift technique and concentrated
on the continuum region. Also a discussion of peculiarities of
quantal calculation for single particle level density of energy –
dependent potential

View Publication Preview PDF
Publication Date
Sat Jul 03 2021
Journal Name
Medicine, Conflict And Survival
Domestic violence in time of unrest, a sample from Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref