Preferred Language
Articles
/
gRif5pYBVTCNdQwCSYnv
Development of an Innovative Reinforced Food Packaging Film Based on Corn Starch/Hydroxypropyl Methylcellulose/Nanocrystalline Cellulose Incorporated with Nanogel Containing Quercetin
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Case Studies In Construction Materials
Experimental and environmental investigations of the impacts of wood sawdust on the performance of reinforced concrete composite beams
...Show More Authors

View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Civil Engineering Journal
Effect of Size and Location of Square Web Openings on the Entire Behavior of Reinforced Concrete Deep Beams
...Show More Authors

This paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the dee

... Show More
View Publication
Crossref (12)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Civil Engineering Journal
Effect of Size and Location of Square Web Openings on the Entire Behavior of Reinforced Concrete Deep Beams
...Show More Authors

This paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the dee

... Show More
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Jun 07 2025
Journal Name
Al-fatih Journal
Effect of resistance training on the development of marital some elements of physical fitness
...Show More Authors

يشهد العالم تقدما في كافة مجالات الحياة المختلفة وتزداد الحياة صعوبة يوما بعد يوم, ويزداد البحث في كافة المجالات التي تعمل على خدمة الإنسان ولقد طال هذا التقدم النشاط الرياضي ,فقد يكون لتطور التدريب الرياضي وتنوع أساليبه الدور الكبير في تحقيق اللياقة البدنية التي تعد إحدى أهم الأهداف التي يرمي إليها الدرس في كلية التربية الرياضية . واللياقة البدنية تستمد أهميتها من كونها إحدى مكونات اللياقة الشاملة التي بدو

... Show More
View Publication
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design Active Filter Based on Genetic Algorithm
...Show More Authors

The  lossy-FDNR  based  aclive  fil ter has an  important   property among  many  design  realizations. 'This includes  a significant reduction in component count particularly in the number  of OP-AMP which consumes   power.  However  the·  problem  of  this   type  is the  large component spreads  which affect the fdter performance.

In  this  paper   Genetic   Algorithm   is  applied   to  minimize   the component  spread   (capacitance  and  resistance  p,read). The minimization of these spreads allow the fil

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modeling Dynamic Background based on Linear Equation
...Show More Authors

     Detection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors