Preferred Language
Articles
/
joe-1387
Development and Verification of the Capacity Curve for Two Dimensional Reinforced Concrete Moment-Resisting Frames System under Earthquake Loading
...Show More Authors

Pushover analysis is an efficient method for the seismic evaluation of buildings under severe earthquakes. This paper aims to develop and verify the pushover analysis methodology for reinforced concrete frames. This technique depends on a nonlinear representation of the structure by using SAP2000 software. The properties of plastic hinges will be defined by generating the moment-curvature analysis for all the frame sections (beams and columns). The verification of the technique above was compared with the previous study for two-dimensional frames (4-and 7-story frames). The former study leaned on automatic identification of positive and negative moments, where the concrete sections and steel reinforcement quantities the source of these moments. The comparison of the results between the two methodologies was carried out in terms of capacity curves. The results of the conducted comparison highlighted essential points. It was included the potential differences between default and user-defined hinge properties in modeling. The effect of the plastic hinge length and the transverse of shear reinforcement on the capacity curves was also observed. Accordingly, it can be considered that the current methodology in this paper more logistic in the representation of two and three-dimensional structures.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Improving Photovoltaic Panel (PV) Efficiency via Two Axis Sun Tracking System
...Show More Authors

In this paper two axis sun tracking method is used to absorb maximum power from the sun's rays on the solar panel via calculating the sun’s altitude and azimuth angles, which describe the solar position on the Iraqi capital Baghdad for the hours 6:00, 7:00, 8:00, 9:00, 12:00, 15:00 and 17:00 per day. The angles were calculated in an average approach within one month, so certain values were determined for each month. The daily energy achieved was calculated for the solar tracking method compared with the fixed tracking method. Designed, modeled and simulated a control circuit consisting of reference position truth table, PI Controller and two servomotors that tracked the sun position to adjust the PV panel perpendicular

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
International Journal Of Agronomy
Molybdenum Induces Growth, Yield, and Defence System Mechanisms of the Mung Bean (Vigna radiata L.) under Water Stress Conditions
...Show More Authors

Water stress has a negative impact on the yield and growth of crops worldwide and consequently has a global impact on food security. Many biochemical changes occur in plants as a response to water stress, such as activation of antioxidant systems. Molybdenum (Mo) plays an important part in activating the expression of many enzymes, such as CAT, POD, and SOD, as well as increasing the proline content. Mo therefore supports the defence system in plants and plays an important role in the defence system of mung bean plants growing under water stress conditions. Four concentrations of Mo (0, 15, 30, and 45 mg·L−1) were applied to plants, using two approaches: (a) seed soaking and (b) foliar application. Mung bean plants were subject

... Show More
View Publication
Scopus (13)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Dosimetric Verification of Gamma Passing Rate for Head and Neck Cases Treated with Intensity Modulated Radiation Therapy (IMRT) Treatment Planning Technique
...Show More Authors

Each Intensity Modulated Radiation Therapy (IMRT) plan needs to be tested and verified before any treatment to check its quality. Octavius 4D-1500 phantom detector is a modern and qualified device for quality assurance procedure. This study aims to compare the common dosimetric criteria 3%/3 mm with 2%/2 mm for H&N plans for the IMRT technique. Twenty-five patients with head and neck (H&N) tumor were with 6MV x-ray photon beam using Monaco 5.1 treatment planning software and exported to Elekta synergy linear accelerator then tested for pretreatment verification study using Octavius 4D-1500 phantom detector. The difference between planned and measured dose were assessed by using local and global gamma index (GI) analysis method at

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Planner And Development
Alternative development in the proposed model of the Strategy for Empowerment and Spatial Sustainable Development/ Baghdad Governorate Council as a case study
...Show More Authors

This research mainly aims to analyze local development strategy in Baghdad Governance, build the Strategic Model based on the study area's spatial interaction, and achieve the Trinity of Excellence based on the global model of excellence.

           This research applied SWOT strategic analysis for the strengths and weaknesses of the internal environment and opportunities and threats of the external environment for the provincial council. In conclusion, the research specifies appropriate alternatives and choosing the best in line with the reality of the Baghdad Provincial Council. Also, the strategic goals in the national plan and the spatial interaction of the development goals,

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The reality of smart city development management in the comprehensive development plan for the city of Baghdad 2030
...Show More Authors

Abstract

Abstract has many advantages as has historically been one of the regions leading cultural centers . for centuries , it has been a center of commertial and financial operations in Iraq. it is also rich in archeological sites and natural resources, but because of its wars and implementation of urban development strategies are effective and sustainable , so contracted the secretariat of Baghdad with the company (khatib and scirntiffic) for the preparation of the comprehensive development plan for the city of Baghdad in 2030 and funded by the world bank and the fact that the plan was approved ( three stages of it ) and only one phase remains the fourth stage, which is under discussion the aim of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Measurement of Impact of Banking System Development on Economic Growth in Iraq
...Show More Authors

At the heart of every robust economy is a vital banking system. The functional banking system can effectively perform several functions such as mobilizing savings, allocating credit, monitoring managers, transforming risks, and facilitating the financial transactions. This paper aims to measure the impact of banking system development on economic growth in Iraq. Credit to private sector divided by GDP used as a proxy of banking development. Real per capita GDP used as a proxy of economic growth. By using Autoregressive Distributed Lag (ARDL) model, the paper finds that the undeveloped Iraqi banking system could not promote economic growth in the country. Therefore, a variety of policies need to be taken to spur the role of bankin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (28)
Crossref (15)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Chilean Journal Of Statistics
A method of multi-dimensional variable selection for additive partial linear models.
...Show More Authors

In high-dimensional semiparametric regression, balancing accuracy and interpretability often requires combining dimension reduction with variable selection. This study intro- duces two novel methods for dimension reduction in additive partial linear models: (i) minimum average variance estimation (MAVE) combined with the adaptive least abso- lute shrinkage and selection operator (MAVE-ALASSO) and (ii) MAVE with smoothly clipped absolute deviation (MAVE-SCAD). These methods leverage the flexibility of MAVE for sufficient dimension reduction while incorporating adaptive penalties to en- sure sparse and interpretable models. The performance of both methods is evaluated through simulations using the mean squared error and variable selection cri

... Show More
View Publication Preview PDF
Crossref