Preferred Language
Articles
/
hoaPrYYBIXToZYALfaOq
Strength compensation of deep beams with large web openings using carbon fiber–reinforced polymer sheets
...Show More Authors

This article presents the results of an experimental investigation of using carbon fiber–reinforced polymer sheets to enhance the behavior of reinforced concrete deep beams with large web openings in shear spans. A set of 18 specimens were fabricated and tested up to a failure to evaluate the structural performance in terms of cracking, deformation, and load-carrying capacity. All tested specimens were with 1500-mm length, 500-mm cross-sectional deep, and 150-mm wide. Parameters that studied were opening size, opening location, and the strengthening factor. Two deep beams were implemented as control specimens without opening and without strengthening. Eight deep beams were fabricated with openings but without strengthening, while the other eight deep beams were with openings in shear spans and with carbon fiber–reinforced polymer sheet strengthening around opening zones. The opening size was adopted to be 200 × 200 mm dimensions in eight deep beams, while it was considered to be 230 × 230 mm dimensions in the other eight specimens. In eight specimens the opening was located at the center of the shear span, while in the other eight beams the opening was attached to the interior edge of the shear span. Carbon fiber–reinforced polymer sheets were installed around openings to compensate for the cutout area of concrete. Results gained from the experimental test showed that the creation of openings in shear spans affect the load-carrying capacity, where the reduction of the failure load for specimens with the opening but without strengthening may attain 66% compared to deep beams without openings. On the other hand, the strengthening by carbon fiber–reinforced polymer sheets for beams with openings increased the failure load by 20%–47% compared with the identical deep beam without strengthening. A significant contribution of carbon fiber–reinforced polymer sheets in restricting the deformability of deep beams was observed.

Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Postoperative Follow-up for Patients with Recurrent Kidney Stone
...Show More Authors

Abstract Kidney stones are one of the most common and most painful medical problems known (1). Nurses assess and monitor patients through diagnosis and treatment and teach patients how to avoid recurrence of stones (2). A descriptive study was conducted on 150 patients diagnosed with recurrent kidney stones, who were attending the out patients consultation urology disease clinics at surgical specialties, Al-Kadhimia, Al-Yarmook, and Al-Karama Teaching Hospital and Extracorporeal shock wave lithotripsy (ESWL) departments for the period from the 1st of Feb. 2002 through to the end of May 2004. The aim of

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 31 2018
Journal Name
Al-kindy College Medical Journal
Leigh Syndrome: Report of a Rare Case with Late Onset Presentation
...Show More Authors

Leigh's syndrome, or sub acute necrotizing encephalomyelopathy, is a rare inherited neurometabolic disease of infancy and early childhood with variable course and prognosis. Rarely, it occurs in juveniles and adults. The diagnosis is difficult and still remains to challenge the clinicians on the basis of history; hence the role of imaging is very essential. It is the neuroimaging, chiefly the Magnetic Resonance Imaging showing characteristic symmetrical necrotic lesions in the basal ganglia and/or brain stem that leads to the diagnosis. Late-onset varieties are rare and only few cases were reported all over the world. Here, I report a case of late onset (juvenile) Leigh syndrome presenting with an acute polyneuropathy. Neuroimaging confi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 03 2015
Journal Name
International Journal Of Research Studies In Biosciences
Study the Histopathology of Immuno-Therapytrail in Mice Infected with Hydatidcysts
...Show More Authors

The study was trail to treated secondary hydatid cysts in white micepost-infection with Echinococcosis of sheep origin, by immunization with a mixture of CFAgs/PSAgs prepared from haydatid Cyst Fluid antigens (CFAgs) and Proto scolices antigens (PSAgs) respectively, two concentrations (7.5 &15 mg/ml) in addition to two derivatives of benzimidazole; albendazole (A) and mebendazole (M) 10 and 40μg/gm body weight, respectively, one week after challenged dose with protoscolices. to determine the efficacy of immunization and chemotherapy simultaneously in reduction the number of growing cysts, then measured both humoral and cell-mediated immunity. Results: elevation the immune responses that reflected decrease number and diameter of hydatid cys

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Physics
Structural and Morphological Characterization of MEH-PPV Nanocomposite Doped with FeCl3
...Show More Authors

Poly [2-methoxy-5-(2-ethylhexyloxy)-1, 4-phenylenevinyl] (MEH-PPV) thin films were created in this study using both spin coating and drop casting processes. MEH-PPV thin films generated by Ferric Chloride (FeCl3) doping (0.03, 0.06, 0.09, and 0.12 wt%) were studied for some physical features using Fourier-Transform Infrared Spectroscopy (FTIR), Field Emission Scanning Electron Microscopy (FE-SEM), and Energy Dispersive X-ray Spectroscopy (EDX). An FTIR test showed that there was no chemical reaction that occurred between Ferric Chloride (FeCl3) and MEH-PPV, but rather a physical one, that is, an organic material composite occurred. As for FE-SEM, the pure sample MEH-PPV formed uniformly, but when FeCl3 was added by weight, we have differ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 26 2021
Journal Name
Communications In Mathematical Biology And Neuroscience
Modelling and stability analysis of the competitional ecological model with harvesting
...Show More Authors

The interplay of predation, competition between species and harvesting is one of the most critical aspects of the environment. This paper involves exploring the dynamics of four species' interactions. The system includes two competitive prey and two predators; the first prey is preyed on by the first predator, with the former representing an additional food source for the latter. While the second prey is not exposed to predation but rather is exposed to the harvest. The existence of possible equilibria is found. Conditions of local and global stability for the equilibria are derived. To corroborate our findings, we constructed time series to illustrate the existence and the stability of equilibria numerically by varying the different values

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Journal Of Research In Pharmacy
Preparation and evaluation of transdermal gel loaded with spanlastics containing meloxicam
...Show More Authors

A transdermal drug delivery system (TDDS) is characterized by the application of medications onto the skin's surface to deliver drugs at a controlled and predefined rate through the skin. Spanlastics, an elastic nanovesicle capable of transporting various pharmacological substances, shows promise as a drug delivery carrier. It offers numerous advantages over traditional vesicular systems applied topically, including enhanced stability, flexibility in penetration, and improved targeting capabilities. This study aims to develop meloxicam (MX)-loaded spanlastics gel as skin delivery carriers and to look into the effects of formulation factors like Tween80, Brij 35, and carbopol concentration on the properties of spanlastics gel, like pH, drug

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering Science And Technology
THERMAL PERFORMANCE OF MULTIPLE- PASS SOLAR AIR HEATER WITH PIN FINS
...Show More Authors

Scopus (6)
Scopus
Publication Date
Sat Sep 27 2025
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-

... Show More
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref