Preferred Language
Articles
/
fhfn3JEBVTCNdQwCC5vE
Horizontal pushout tests and parametric analyses of a locking-bolt demountable shear connector
...Show More Authors

A ‘locking-bolt’ demountable shear connector (LBDSC) is proposed to facilitate the deconstruction and reuse of steel-concrete composite structures, in line with achieving a more sustainable construction design paradigm. The LBDSC is comprised of a grout-filled steel tube and a geometrically compatible partially threaded bolt. The latter has a geometry that ‘locks’ the bolt in compatible holes predrilled on the steel flange and eliminates initial slip and construction tolerance issues. The structural behaviour of the LBDSC is evaluated through nine pushout tests using a horizontal test setup. The effects of the tube thickness, strength of concrete slab, and strength of infilled grout on the shear resistance, initial stiffness, and ductility of the LBDSC are assessed. The experimental results show that the LBDSC can achieve higher shear resistance and similar initial stiffness as compared to traditional welded studs. In addition, all tested LBDSCs exhibited slip capacities ranging from 14 to 32 mm and can be classified as ductile shear connectors according to Eurocode 4. A detailed finite element model was also created and found to be reliable to reproduce the experimental behaviour. Parametric studies were subsequently conducted using the validated model to study further parameters and generalise the experimental results. Due to the specific test setup, non-negligible uplift forces were generated in the connector and the potential implications are discussed.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Sun May 01 2011
Journal Name
Information Sciences
Design and implementation of a t-way test data generation strategy with automated execution tool support
...Show More Authors

View Publication
Scopus (66)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Study the Properties of Sodium Silicate Composite as a Barrier Separating Between the Internal Oil Distillation Towers and Chemical Fumes of Crude Oil
...Show More Authors

The study of surface hardness, wear resistance, adhesion strength, electrochemical corrosion resistance and thermal conductivity of coatings composed from sodium silicate was prepared using graphite micro-size particles and carbon nano particles as fillers respectively of concentration of (1-5%), for the purpose of covering and protecting the oil distillation towers. The results showed that the sodium silicate coating reinforced with carbon nano-powder has higher resistance to stitches, mechanical wear, adhesive and thermal conductivity than graphite/sodium silicate composite especially when the ratio 5% and 1%, the electrochemical corrosion test confirmed that the coating process of stainless steel 304 lead to increasin

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
A study of the effect of nano materials on the physical properties of epoxy composites
...Show More Authors

This research studies the effect of addition of some nanoparticles
(MgO, CuO) and grain size (30,40nm) on some physical properties
(impact strength, hardness and thermal conductivity) for a matrix
blend of epoxy resin with SBR rubber. Hand –Lay up method was
used to prepare the samples. All samples were immersed in water for
9 weeks.
The Results showed decreased in the values of impact strength and
hardness but increased the coefficient of thermal conductivity.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Waste as a resource of economic resources: A case study using environmentalthe index MIP
...Show More Authors

Due to increased consumption of resources, especially energy it was necessary to find alternatives characterized by the same quality as well as being of less expensive, and most important of these alternatives are characterized by waste and the fact that humancannot stop consumption. So we  have consideredwaste as an  alternative and cheap economic resources and by using environmental index the MIP (input materials per unit ,unit / service) is based on the grounds that the product is not the end of itselfit is a product to meet the need  of a product or service, awarded a resource input and output within the five basic elements are the raw materials is ecological, Raw materials ecological, water, air and soil erosion for a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 03 2022
Journal Name
Military Medical Science Letters
COVID-19 AMONG A SAMPLE OF IRAQI PATIENTS WITH RHEUMATIC DISEASES: A MULTICENTER STUDY
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
THE PORTRAIT OF THE ARTIST AS A ROBOT: A LITERARY LOOK AT E-POETRY
...Show More Authors

This study examines the validity of e-poetry as an acceptable literary genre. The
thematic, stylistic and esthetic features of a selected number of e-poems produced by
poetry generators are analyzed for this purpose. The e-poems are then compared with a
number of works written by Dada poets in order to establish the literary merit of the
former.

View Publication Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
The Journal Of Legal And Social Sciences
Limitations on the authority of a judge in case-law ( France as a model )
...Show More Authors

When exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u

... Show More
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Noor's Curve, a New Geometric Form of Agnesi Witch, a Construction Method is Produced
...Show More Authors

In this paper, a new form of 2D-plane curves is produced and graphically studied. The name of my daughter "Noor" has been given to this curve; therefore, Noor term describes this curve whenever it is used in this paper. This curve is a form of these opened curves as it extends in the infinity along both sides from the origin point. The curve is designed by a circle/ ellipse which are drawing curvatures that tangent at the origin point, where its circumference is passed through the (0,2a). By sharing two vertical lined points of both the circle diameter and the major axis of the ellipse, the parametric equation is derived. In this paper, a set of various cases of Noor curve are graphically studied by two curvature cases;

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref