Preferred Language
Articles
/
joe-1262
Finite Element Analysis of Cracked One-Way Bubbled Slabs Strengthened By External Prestressed Strands
...Show More Authors

Bubbled slabs can be exposed to damage or deterioration during its life. Therefore, the solution for strengthening must be provided. For the simulation of this case, the analysis of finite elements was carried out using ABAQUS 2017 software on six simply supported specimens, during which five are voided with 88 bubbles, and the other is solid. The slab specimens with symmetric boundary conditions were of dimensions 3200/570/150 mm. The solid slab and one bubbled slab are deemed references. Each of the other slabs was exposed to; (1) service charge, then unloaded (2) external prestressing and (3) loading to collapse under two line load. The external strengthening was applied using prestressed wire with four approaches, which are L1-E, L2-E, L1-E2, and L2-E2, where the lengths and eccentricities of prestressed wire are (L1=1800, L2=2400, E1=120 and E2=150 mm). The results showed that each reinforcement approach restores the initial capacity of the bubbled slab and improves it in the ultimate load capacity aspect. The minimum and maximum ultimate strength of strengthened cracked bubbled slab increased by (17.3%-64.5%) and (25.7%-76.3%) than solid and bubbled slab, respectively. It is easier to improve behavior with an increased eccentricity of the prestressed wire than to increase its length.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 10 2023
Journal Name
Journal Of Kufa For Chemical Sciences
Study Of Effect Adsorption Of E127 Dye By Iraqi Clay From Aqueous Solution
...Show More Authors

Abstract The surface of kaolin was diagnosed by an AFM and the results were shown The height of the highest peak reached by a quantity of Kaolin ‎surface is 2.5 µm, the granules, and their diameter with an average diameter of 666.1nm. Using Kaolin's adsorption properties, erythrosine was removed of its aqueous solution. It was determined that the maximal dye adsorption ranged 36.53–40.61%. ‎‎‎‎The results of using the Freundlich, Langmuir, and Temkin adsorption isotherms revealed that at temperatures of (298,308,318) K, the Freundlich model was followed, the Langmuir model did not match, and the Temkin model could only be partially applied. There is also physical adsorption. One of the three kinetic models of the

... Show More
View Publication
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Corrosion protection of pure titanium implant by electrochemical deposition of hydroxyapatite post-anodizing
...Show More Authors

In this study, a Hydroxyapatite (HA) coating was prepared on a titanium implant by an electrochemical deposition process. The titanium pre-treatment by anodizing in 1.65 mol/L sulfuric acid with (10V) at room temperature. The deposition was all conducted at a constant voltage of 6.0 V, for 1 h at room temperature. The coatings thus prepared were characterized with Fourier transform infrared spectroscopy (FTIR) and thickness of the coated layer.The electrochemical deposition of HA occurred on the titanium as a cathode. Coated titanium by HA after anodizing revealed a good corrosion protection efficiency even at a temperature ranged (293-323) K in artificial saliva. Activation energy and pre-exponential factor (kinetic parameters) were calcul

... Show More
View Publication Preview PDF
Scopus (13)
Scopus
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Contemporary Mathematical Sciences
Pre-Topology Generated by the Short Path Problems
...Show More Authors

Let G be a graph, each edge e of which is given a weight w(e). The shortest path problem is a path of minimum weight connecting two specified vertices a and b, and from it we have a pre-topology. Furthermore, we study the restriction and separators in pre-topology generated by the shortest path problems. Finally, we study the rate of liaison in pre-topology between two subgraphs. It is formally shown that the new distance measure is a metric

Preview PDF
Publication Date
Fri Jul 26 2024
Journal Name
Academia Open
Enhancing Pediatric Nursing Skills by Top Learning Strategies
...Show More Authors

Background: The efficacy of educational strategies is crucial for nursing students to competently perform pediatric procedures like nasogastric tube insertion. Specific Background: This study evaluates the effectiveness of simulation, blended, and self-directed learning strategies in enhancing these skills among nursing students. Knowledge Gap: Previous research lacks a comprehensive comparison of these strategies' impacts on skill development in pediatric nursing contexts. Aims: The study aims to assess the effectiveness of different educational strategies on nursing students' ability to perform pediatric nasogastric tube insertions. Methods: A pre-experimental design was employed at the College of Nursing, University of Baghdad, i

... Show More
View Publication
Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 06 2017
Journal Name
International Journal Of Science And Research (ijsr)
Facing Uncertainty Dimensions by Depending on Strategic Conversation,
...Show More Authors

The research starts from a fundamental problem about how top management team can realize the uncertainty. Strategic conversation has been introduced as a way for top management team to deal with uncertainties. Within the current research model, the strategic conversation was considered as an independent variable and uncertainty as dependent variable. The researcher used the survey method by distributed a questionnaire in the Administration and Economics College, University of Baghdad. Samples are 40 faculty participant of scientific committee members were distributed in seven scientific departments. The data were statistically analyzed by mean and the standard deviation. The hypotheses were tested through the use of correlation and regressi

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Diagnosing Pilgrimage Common Diseases by Interactive Multimedia Courseware
...Show More Authors

In this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
ESTIMATING NONPARAMETRIC AUTOREGRESSIVE CURVE BY SMOOTHING SPLINES METHOD
...Show More Authors

Preview PDF
Scopus
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF