This paper presents the non-linear finite element method to study the behavior of four reinforced rectangular concrete MD beams with web circular openings tested under two-point load. The numerical finite elements methods have been used in a much more practical way to achieve approximate solutions for more complex problems. The ABAQUS /CAE is chosen to explore the behavior of MD beams. This paper also studies, the effect of both size and shape of the circular apertures of MD beams. The strengthening technique that used in this paper is externally strengthening using CFRP around the opening in the MD beams. The numerical results were compared to the experimental results in terms of ultimate load failure and displacement. The FE results showed a good agreement with experimental results.
Introduction: Cutaneous leishmaniasis (CL) is a common protozoan disease in Iraq characterized by localized ulcers, primarily on exposed skin. This study aimed to investigate the hematological parameters of infected patients using a complete blood count (CBC) in the endemic area of Diyala Governorate, northeast of Baghdad. This has been studied in newly diagnosed, untreated individuals and patients receiving sodium antimony gluconate. Methodology: Hematological screening was performed on blood samples from 161 patients with microscopically diagnosed cutaneous leishmaniasis before and after treatment. Anti-Leishmania IgG was also assessed by ELISA in seropositive and seronegative subjects. Results: The newly diagnosed, untreated pati
... Show MoreMy research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreAbstract Background: The hip joint and lumbar spine are both anatomically and functionally closely related as had shown by many authors. So the abnormality in one area can affect the other e.g. hip joint osteoarthritis can cause lumbar sagittal malalignment and backache. Objectives: is to see if there is significant improvement in backache after total hip replacement? And which degree of backache improvement is associated with significant changes in lumbar lordosis? Methods and patients: a prospective open trial study was performed on 30 patients who had severe hip osteoarthritis and chronic low back pain. Total hip replacement was performed to all patients. Backache and lumbar lordosis were measured by visual analogue scale and Cobb’s a
... Show MoreResearch Summary
In The Name of Allah Most Gracious Most Merciful
The word injustice and its derivatives were repeated in the Holy Qur’an in several places, approximately (154) times. This is due to the severity of its danger, and that the most dangerous thing that our Islamic nation suffers from in our time is; It is injustice in all its forms and types, so we should all have an honest review of the sincere change in the right direction, and uncover cases of injustice and explain their causes and causes, and work to treat them and rid the wrongdoers of their injustice, and help them to correct their condition. To reveal their grievances and explain their causes and causes, and work to remedy them, and support them and mi
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreBackground: coronavirus 19 is a beta-coronavirus, enveloped and roughly spherical with approximately 60 to 140 nm in diameter with positive-sense single-stranded RNA genome.
Objectives: Measurement of interleukin 6 (IL6) level in a group of patients with confirmed Covid19 infection and its correlation with many hematological and biochemical parameters , mainly lymphocyte , neutrophil count and their ratio , platelet count , serum ferritin , C reactive protein as well as D-dimer level
Subjects and Methods: This study was conducted on 60 PCR positive patients variably affected by COVID-19 , cases collected sequentially from June till November 20
... Show More