Preferred Language
Articles
/
joe-1262
Finite Element Analysis of Cracked One-Way Bubbled Slabs Strengthened By External Prestressed Strands
...Show More Authors

Bubbled slabs can be exposed to damage or deterioration during its life. Therefore, the solution for strengthening must be provided. For the simulation of this case, the analysis of finite elements was carried out using ABAQUS 2017 software on six simply supported specimens, during which five are voided with 88 bubbles, and the other is solid. The slab specimens with symmetric boundary conditions were of dimensions 3200/570/150 mm. The solid slab and one bubbled slab are deemed references. Each of the other slabs was exposed to; (1) service charge, then unloaded (2) external prestressing and (3) loading to collapse under two line load. The external strengthening was applied using prestressed wire with four approaches, which are L1-E, L2-E, L1-E2, and L2-E2, where the lengths and eccentricities of prestressed wire are (L1=1800, L2=2400, E1=120 and E2=150 mm). The results showed that each reinforcement approach restores the initial capacity of the bubbled slab and improves it in the ultimate load capacity aspect. The minimum and maximum ultimate strength of strengthened cracked bubbled slab increased by (17.3%-64.5%) and (25.7%-76.3%) than solid and bubbled slab, respectively. It is easier to improve behavior with an increased eccentricity of the prestressed wire than to increase its length.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 16 2025
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Mon Oct 03 2022
Journal Name
Egyptian Journal Of Chemistry
Improving Biogas Production from Rice Husk Waste by Mixing with Pomegranate peels Waste by using Anaerobic Digestion
...Show More Authors

Biogas is one of the most important sources of renewable energy and is considered as an environment friendly energy source. The major goal of this research is to see if rice husk (Rh) waste and pomegranate peels (PP) waste are suitable for anaerobic digestion and what effect NaOH pre-treatment has on biogas generation. Rice husk and pomegranate peels were tested in anaerobic digestion under patch anaerobic conditions as separate wastes as well as blended together in equal proportions. The cumulative biogas output for the blank test (no pretreatment) was 1923 and 2526 ml, respectively using a single rice husk (Rh) and pomegranate peel (PP) substrates. The 50% rice husk digestion and 50% of pomegranate peels for blank test gave the result 224

... Show More
Publication Date
Tue May 01 2018
Journal Name
Antimicrobial Agents And Chemotherapy
Complex Interplay between Sphingolipid and Sterol Metabolism Revealed by Perturbations to the Leishmania Metabolome Caused by Miltefosine
...Show More Authors

With the World Health Organization reporting over 30,000 deaths and 200,000 to 400,000 new cases annually, visceral leishmaniasis is a serious disease affecting some of the world's poorest people. As drug resistance continues to rise, there is a huge unmet need to improve treatment. Miltefosine remains one of the main treatments for leishmaniasis, yet its mode of action (MoA) is still unknown. Understanding the MoA of this drug and parasite response to treatment could help pave the way for new and more successful treatments for leishmaniasis. A novel method has been devised to study the metabolome and lipidome ofLeishmania donovaniaxenic amastigotes treated with miltefosi

... Show More
View Publication
Scopus (32)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SPECTROPHTOTOMETRIC DETERMINATION OF PURE SULFAMETHOXAZOLE IN PHARMACEUTICAL PREPARATIONS BY OXIDATIVE COUPLING REACTION: SPECTROPHTOTOMETRIC DETERMINATION OF PURE SULFAMETHOXAZOLE IN PHARMACEUTICAL PREPARATIONS BY OXIDATIVE COUPLING REACTION
...Show More Authors

            A new, simple, rapid and sensitive spectrophotometric method for the determination of sulfamethoxazole in both pure form and pharmaceutical preparations has been reported.The adapted technique based on utilization 4-aminobenzene sulfonic acid as a new modern chromogenic through an oxidative coupling reaction with sulfamethoxazole and potassium iodate in basic media to form orange soluble dye product with absorption maxima at 490 nm. Subject to Beer's law in the range 2–32μg mL-1. The values of molarabsorption coefficient (ε) and correlation coefficient were found to be 9.118 × 103 and0.9999 respectively whereas the Sandels index was

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Statistical Applications In Genetics And Molecular Biology
Mixture model-based association analysis with case-control data in genome wide association studies
...Show More Authors
Abstract<p>Multilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated d</p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Transition Metal Complexes with Tridentate Ligand: Preparation, Spectroscopic Characterization, Thermal Analysis and Structural Studies
...Show More Authors

New series of metal ions complexes have been prepared from the new ligand 1,5- Dimethyl-4- (5-oxohexan-2- ylideneamino) -2-phenyl- 1H-pyrazol-3 (2H)-one derived from 2,5-hexandione and 4-aminophenazone. Then, its V(IV), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) complexes prepared. The compounds have been characterized by FT-IR, UV-Vis, mass and 1H and 13C-NMR spectra, TGA curve, magnetic moment, elemental microanalyses (C.H.N.O.), chloride containing, Atomic absorption and molar conductance. Hyper Chem-8 program has been used to predict structural geometries of compounds in gas phase, the heat of formation, (binding, total and electronic energy) and dipole moment at 298 K.

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue May 31 2022
Journal Name
Journal Of Positive School Psychology
Self-Society Conflict in Angie Thomas’ the Hate U Give: A Critical Discourse Analysis
...Show More Authors

Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Fri Dec 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Performance Analysis for Hybrid Massive MIMO FSO/RF Links Based on Efficient Channel Codes
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref