Preferred Language
Articles
/
joe-2104
Behaviour of Fire Exposed Reinforced Concrete Rigid Beams with Restrained Ends
...Show More Authors

This paper is devoted to investigate the effect of burning by fire flame on the behavior and load carrying capacity of rectangular reinforced concrete rigid beams. Reduced scale beam models (which are believed to resemble as much as possible field conditions) were suggested. Five end restrained beam specimens were cast and tested. The specimens were subjected to fire flame temperatures ranging from (25-750) ºC at age of 60 days, two temperature levels of 400ºC and 750ºC were chosen with exposure duration of 1.5 hour. The cast rectangular reinforced concretebeam (2250×375×375 mm) (length× width× height respectively) were subjected to fire. Results indicate remarkable reduction in the ultrasonic pulse velocity and rebound number of the rigid beams after cooled in water were (2-5 %) more than rigid beam specimens cooled in air. Load-deflection curves indicate deleterious response to the fire exposure. Also, it was noticed that the maximum crack width increases with increasing fire temperature.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Psychological stress in unemployed individuals and its association with well being
...Show More Authors

The aim of this study is to detect the level of psychological stress among unemployed individuals and the level of their wellbeing by finding the correlation between these two variables.

          The research sample consisted of (99) people who are currently unemployed and registered at the Ministry of Labor Affairs.

Schafer (1996) scale for psychological stress was used and alongside Ziout's (2012) scale for wellbeing.

          The results of the research showed an inverse relation between being unemployed and having wellbeing.

 &nb

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Medico-legal Update
Asprosin Role for Obese Male Patients with Diabetic Mellitus Type II
...Show More Authors

Hormones, their receptors, and the associated signaling pathways make compelling drug targets because of their wide-ranging biological significance to study the role of asprosin in obese male patients with diabetic mellitus type II. ELISA method was used to assay asprosin and insulin. Blood was taken with drawn sample from 30 obese normal patients with age range (40-60) years, 30 diabetic patients with age range (40-60) years at duration of disease (1-5) years and 30 normal healthy patients. The mean difference between T2DM according to insulin % (23.8±0.6) was increased than the mean of IFG (17.7±1.0) (P 0.000). The mean difference between T2DM according to asprosin (122.1±21.8) was increased than the mean of IFG (51.4±2.7) (P 0

... Show More
Publication Date
Sun Oct 01 2023
Journal Name
Ijid Regions
Systemic sclerosis presents its cutaneous manifestations with innovative triple therapeutic regime
...Show More Authors

Scopus
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Hybrid Techniques with Support Vector Machine for Improving Artifact Ultrasound Images
...Show More Authors

     The most common artifacts in ultrasound (US) imaging are reverberation and comet-tail. These are multiple reflection echoing the interface that causing them, and result in ghost echoes in the ultrasound image. A method to reduce these unwanted artifacts using a Otsu thresholding to find region of interest (reflection echoes) and output applied to median filter to remove noise. The developed method significantly reduced the magnitude of the reverberation and comet-tail artifacts. Support Vector Machine (SVM) algorithm is most suitable for hyperplane differentiate. For that, we use image enhancement, extraction of feature, region of interest, Otsu thresholding, and finally classification image datasets to normal or abnormal image.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
On Solving Singular Multi Point Boundary Value Problems with Nonlocal Condition
...Show More Authors

In this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.

View Publication Preview PDF
Publication Date
Thu Apr 15 2021
Journal Name
Biochem. Cell. Arch.
CYTOKINES SERUM PROFILE IMMUNOSUPPRESSANT BALB/C MICE INFECTED WITH CRYPTOSPORIDIUM PARVUM
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Communications In Computer And Information Science
Audio Compression Using Transform Coding with LZW and Double Shift Coding
...Show More Authors

Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Mar 27 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Lipid Profile and Fasting Blood Sugar Analysis in Patients with Cholelithiasis
...Show More Authors

Cholelithiasis is one of the commonest surgical problems and one of the most common gastrointestinal diseases throughout the world but its pathogenesis remains unclear. Many theories have been proposed forward to explain the mechanism of stone formation. It is not fully clear if symptomatic gallstone disease is associated with a specific pattern of some biochemical abnormalities, as lipid profile and fasting blood sugar in serum of patients.

This study was designed to estimate lipid profile and fasting blood sugar in the sera of patients with cholelithiasis in comparison with normal individuals (control).

In this study, 104(male=16, female=88) were symptomatic gallstone patients (aged 42.79± 12.18 years), and 38(male=6

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2009
Journal Name
Iraqi J Comm Med
Clinical Presentations and CT-Scan findings in children with Cerebral Palsy
...Show More Authors

Background: Cerebral palsy is non-progressive disorder of posture or movement due to a lesion of the developing brain. It is the commonest physical disability in childhood. Objective: To study the clinical, neurological abnormalities, prevalence of convulsion (epilepsy) & to asses the value of CT scans of brain in patients with cerebral palsy.

Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref