Preferred Language
Articles
/
joe-2250
Retrofitting Reinforced Concrete One–Way Damaged Slabs Exposed to High Temperature
...Show More Authors

Exposure of reinforced concrete buildings to an accidental fire may result in cracking and loss in the bearing capacity of their major components, columns, beams, and slabs. It is a challenge for structural engineers to develop efficient retrofitting techniques that enable RC slabs to restore their structural integrity, after being exposed to intense fires for a long period of time. Experimental
investigation was carried out on twenty one slab specimens made of self compacting concrete, eighteen of them are retrofitted with CFRP sheets after burning and loading till failure while three of them (which represent control specimens) are retrofitted with CFRP sheet after loading till failure without burning. All slabs had been tested in a simply supported span and subjected to two-point loading. The main variables were the effect of different temperature levels (300ºC, 500ºC and 700ºC),different concrete compressive strength (20MPa, 30MPa and 40MPa) and cooling rate (gradually and sudden cooling conditions) on the behavior of retrofitted one way slabs .The structural response of each slab specimen was investigated in terms of load-deflection behavior, ultimate load carrying
capacity and mode of failure. The experimental results, generally, indicate that slabs retrofitted using CFRP sheets restored flexural strength values nearly equal to or lower than those of the reference slabs, the retrofitted slabs exhibited larger deflection than the control slabs at ultimate loads. Retrofitted control slabs after loading regained about 93.95% to 97.92% of their original load capacity
(before retrofitting) while the other slabs regained from 42.% to 84% of the load capacity of the original control specimens. Most of the tested slabs failed by concrete crushing at mid span and partial debonding of certain retrofitting systems was also observed for a few cases

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 23 2021
Journal Name
Reviews In Chemical Engineering
Molybdenum nitrides from structures to industrial applications
...Show More Authors

Owing to their remarkable characteristics, refractory molybdenum nitride (MoN x )-based compounds have been deployed in a wide range of strategic industrial applications. This review reports the electronic and structural properties that render MoN x materials as potent catalytic surfaces for numerous chemical reactions and surveys the syntheses, procedures, and catalytic applications in pertinent industries such as the petroleum industry. In particular, hydrogenation, hydrodesulfurization, and hydrodeoxygenation are essential processes in the refinement of oil segments and their conversions into commodity fuels and platform chemicals. N-vacant sites over a catalyst’s surface are a significant driver of diverse chemical phenomena. Studies

... Show More
Preview PDF
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Luqman's commandments to his son: Objective study
...Show More Authors

God  urged to read the Holy Qur’an and to ponder it is commanded, and the Most High said:  That they ponder over His verses and that those with insights remember ().
And this book that God Almighty sent down to the heart of His Prophet, peace and blessings be upon him, is as clear as the sun and the moon.
It is a book of guidance and the constitution of a nation that is the best nation brought forth for mankind, and God has taken care of its preservation as He said:  We have sent down the Remembrance, and we are its guardians.
This has been chosen for this topic (Luqman's commandments to his son) for what we see today in our time and society from the loss of morals and values and the neglect of parents to their chi

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Hyperstructures
HYPER STRUCTURE THEORY APPLIED TO KU-ALGEBRAS
...Show More Authors

In this paper, the concept of a hyper structure KU-algebra is introduced and some related properties are investigated. Also, some types of hyper KU-algebras are studied and the relationship between them is stated. Then a hyper KU-ideal of a hyper structure KU-algebra is studied and a few properties are obtained. Furthermore, the notion of a homomorphism is discussed.

Publication Date
Sun Jan 01 2023
Journal Name
Physical Mesomechanics Of Condensed Matter: Physical Principles Of Multiscale Structure Formation And The Mechanisms Of Nonlinear Behavior: Meso2022
Optimal control strategy applied to diabetes model
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of Legal Sciences
Factors Affecting a Doctor’s Obligation to Inform
...Show More Authors

The physician's commitment to medical insight is affected by several factors that vary from patient to patient in terms of the nature of the disease, the severity of the disease, the age of the patient, and the purpose of undergoing medical intervention. There are circumstances surrounding patients that require the physician to reduce the insight towards them, by concealing medical information. The physician must firmly commit to expanding the scope of his vision to a wider extent than in normal medical work. Therefore, we will discuss in this regard the cases in which medical explanation is reduced and the cases that require confirmation in the following order.

View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
RADAR PARAMETER GENERATION TO IDENTIFY THE TARGET
...Show More Authors

Due to the popularity of radar, receivers often “hear” a great number of other transmitters in
addition to their own return merely in noise. The dealing with the problem of identifying and/or
separating a sum of tens of such pulse trains from a number of different sources are often received on
the one communication channel. It is then of interest to identify which pulses are from which source,
based on the assumption that the different sources have different characteristics. This search deals with a
graphical user interface (GUI) to generate the radar pulse in order to use the required radar signal in any
specified location.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
The husband's right to discipline his wife
...Show More Authors

The husband’s discipline of his wife is a right prescribed by the Sharia, but it is conditioned discipline with conditions that make this discipline intended to preserve the family institution from disintegration and scattering, so the Islamic Sharia entrusted the husband, the guardian of the family, with the task of disciplining the disobedient and disobedient wife and deviating from the family’s values ​​and constants of mutual respect and obedience in what is good. And a sense of responsibility. This discipline goes through three sequential stages, starting with exhortation and dialogue, passing through abandonment in the beds, and ending with beating. As for the sermon, it is a quiet dialogue followed by a threat of abandonme

... Show More
View Publication Preview PDF