Preferred Language
Articles
/
joe-2177
Effect of Fire Flame (High Temperature) on the Self Compacted Concrete (SCC) One Way Slabs
...Show More Authors

Experimental work was carried out to investigate the effect of fire flame (high temperature) on specimens of one way slabs using Self Compacted Concrete (SCC). By using furnace manufactured for this purpose, twenty one reinforced concrete slab specimens were exposed to direct fire flame. All of specimens have the same dimensions. The slab specimens were cooled in two types, gradually by left them in the air and suddenly by using water. After that the specimens were tested under two point loads, to study, the effect of
different: temperature levels (300ºC, 500ºC and 700ºC), and cooling rate (gradually and sudden cooling conditions) on the concrete compressive strength, modulus of rupture, flexural strength and the behavior of reinforced concrete slab specimens and comparing the results with specimens without burning (reference specimens). The results showed that, the concrete compressive strength, concrete modulus of rupture and the flexural strength decreases while the maximum (central) deflection increases with increasing the fire flame temperature. For suddenly cooled specimens the residual flexural strength is less than that of gradually cooled specimens while the deflection is greater. For slabs with 20 MPa concrete strength and gradually cooled, the residual bending strength percent is 81.5%, 75% and 62.3% ,while the increase in central deflection is 5%, 33%, and 105% at burning temperature 300ºC, 500ºC and
700ºC respectively. For suddenly cooled specimens of the same strength and exposed to the same temperatures above the residual flexural strength is 77.9%, 68.3% and 58.3% while the increase in central deflection is 25%, 52%, and 118% respectively. When the strength of concrete specimens increase, the residual flexural strength experiences small increase and the increase is of lower rate in the central deflection for 300 ºC and 500 ºC burn temperatures while the decrease is significant for 700 ºC burning temperature.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Thu Sep 29 2022
Journal Name
World Journal Of Clinical Infectious Diseases
Five-year retrospective hospital-based study on epidemiological data regarding human leishmaniasis in West Kordofan state, Sudan
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Mar 24 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Assessing Patient Preoperatively and Role in Decreasing Risks on Patients and Preventing Post-Operative Complications for Cholecystectomy
...Show More Authors

Background: Laparoscopic cholecystectomy has many difficulties which include port Insertion, Dissectionof the Calot’s Triangle , Grasping of the Gallbladder , Wall thickness, Adhesion and extraction of theGallbladder. Aim of the Study: To predict how difficult cholecystectomy will be from assessing the patientpreoperatively which, in turn, help in decreasing the risks on the patients and preventing post-operativecomplications. Patients and Methods: A prospective study conducted in the department of General Surgeryat Al-Ramadi Teaching Hospital for the period of nine months from 15th of May 2018 till the 15th of February2019. It included 60 patients, all of them were undergone laparoscopic cholecystectomy for Gallstone. Patientswit

... Show More
View Publication
Crossref
Publication Date
Sat Jun 02 2018
Journal Name
Agroforestry Systems
Biomass and buffer management practice effects on soil hydraulic properties compared to grain crops for claypan landscapes
...Show More Authors

View Publication
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Design and implementation monitoring robotic system based on you only look once model using deep learning technique
...Show More Authors

<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in

... Show More
View Publication
Scopus (13)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jun 26 2025
Journal Name
Plos One
Neurologists’ perspectives on management challenges and mitigation strategies for Parkinson’s disease patients: A qualitative study in Iraq
...Show More Authors

Background Parkinson’s disease (PD) is currently the fastest-growing neurological disorder in the world. Patients with PD face numerous challenges in managing their chronic condition, particularly in countries with scarce healthcare infrastructure. Objective This qualitative study aimed to delve into neurologists’ perspectives on challenges and gaps in the Iraqi healthcare system that influence the management of PD, as well as strategies to mitigate these obstacles. Method Semi-structured interviews were conducted with neurologists from five different Iraqi provinces, working in both hospitals and private neurology clinics, between November 2024 and January 2025. A thematic analysis approach was employed to identify the main challenge

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
On Comparison Study between Double Sumudu and Elzaki Linear Transforms Method for Solving Fractional Partial Differential Equations
...Show More Authors

        In this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using  Mathcad 15.and graphic in Matlab R2015a.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation Pore and Fracture Pressure Based on Log Data; Case Study: Mishrif Formation/Buzurgan Oilfield at Iraq
...Show More Authors

Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr

... Show More
Crossref