Preferred Language
Articles
/
joe-1185
Strengthening of RC Beam with Large Square Opening Using CFRP
...Show More Authors

The use of essential services in modern constructions, such pipes, and ducts, became important, placing these pipes and ducts underneath the soffit of the beam. They made a ceiling sandwich, and that causes to reduce the height of the floor, so the presence of the opening in the beam saves the height of the floor.  In this paper, the investigation of the beam response of reinforced concrete simply supported rectangle beams with square web openings is presented, including a number of the web openings (two, four, and eight), in addition to its use in strengthening the member at the openings (when the beam is planned before casting, internal deformation steel bar is used, and in case of the opening is existing in the beam, (CFRP) fabric is used.). The test results indicated that the opening Strengthening of beams might compensate for the decrease of the beam load capacity because of the existence of the openings in the shear zone. The compensation of beam capacity depends on the strengthening method, which was adopted. The shear crack loads of the strengthened with externally CFRP specimen's reduction ranging from (15.38 to 38.46%) of their failure loads while the shear crack load of internally reinforced strengthened ranging from (15.38 to 30.76%).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 25 2015
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Subject Independent Facial Emotion Classification Using Geometric Based Features
...Show More Authors

Accurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
Feeble Hausdorff spaces in alpha-topological spaces using graph
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Image data compression by using multiwavelete for color image
...Show More Authors

There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja

View Publication Preview PDF
Publication Date
Wed Oct 06 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Civil And Environmental Engineering
Constructing a Corrected Stations Network Using Some Geomatic Techniques
...Show More Authors
Abstract<p>The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R<sup>2</sup>) is 0.077 m observed in Northing. While in</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of The College Of Basic Education
Solving Job-Shop Scheduling Problem Using Genetic Algorithm Approach
...Show More Authors

Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.             &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Dec 16 2024
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

The research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref