Preferred Language
Articles
/
joe-3010
THERMAL BUCKLING OF RECTANGULAR PLATES WITH DIFFERENT TEMPERATURE DISTRIBUTION USING STRAIN ENERGY METHOD
...Show More Authors

By using governing differential equation and the Rayleigh-Ritz method of minimizing the total potential energy of a thermoelastic structural system of isotropic thermoelastic thin plates, thermal buckling equations were established for rectangular plate with different fixing edge conditions and with different aspect ratio. The strain energy stored in a plate element due to bending, mid-plane thermal force and thermal bending was obtained. Three types of thermal distribution have been considered these are: uniform temperature, linear distribution and non-linear thermal distribution across thickness. It is observed that the buckling strength enhanced considerably by additional clamping of edges. Also, the thermal buckling temperatures and thermal buckling load have lowest values at first mode of buckling for all types of ends condition and with all values of aspect ratios

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Association of Circulating MicroRNA-142-3p with Graves Disease
...Show More Authors

This study aims to investigate the possible role of circulating microRNA-142-3p (miR-142-3p) in the
development of graves disease (GD) and its association with the antibody directed against thyroid
stimulating hormone receptor (TSHR-Ab) production in patients with GD. Forty patients with positive
TSHR-Ab enrolled in this study were divided ,based on treatment, into (22 untreated (newly diagnosed) and
18 treated patients) and based on family history (30 with positive family history and 10 with negative family
history). In addition to forty healthy subjects with sex and age matching as a control group. The expression
level of circulating miR-142-3p was determined by two steps reverse transcription polymerase c

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The Mechanical Behavior Of Materials
Performance of doubly reinforced concrete beams with GFRP bars
...Show More Authors
Abstract<p>The study focused on examining the behavior of six concrete beams that were reinforced with glass fiber-reinforced polymer (GFRP) bars to evaluate their performance in terms of their load-carrying capacity, deflection, and other mechanical properties. The experimental investigation would provide insights into the feasibility and effectiveness of GFRP bars as an alternative to traditional reinforcement materials like steel bars in concrete structures. The GFRP bars were used in both the longitudinal and transverse directions. Each beam in the study shared the following specifications: an overall length of 2,400 mm, a clear span of 2,100 mm, and a rectangular cross-section measuring</p> ... Show More
View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Revision of some Biomarkers with Cytokines in Breast Cancer
...Show More Authors

Breast cancer is the most repeatedly detected cancer category and the second reason cause of cancer-linked deaths among women worldwide. Tumor bio-indictor is a term utilized to describe possible indicators for carcinoma diagnosis, development and progression. The goal of this study is to evaluate part of some cytokines and biomarkers for both serum and saliva samples in breast cancer then estimate their potential value in the early diagnosis of breast cancer by doing more researches in saliva, and utilizing saliva instead of blood (serum and plasma) in sample collection from patients. Serum and salivary samples were taken from 72 patients with breast cancer and 45 healthy controls, in order to investigate the following

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Using LiF Disc in Thermoluminescence Dosimetry
...Show More Authors

A LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.

View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Attacking Jacobian Problem Using Resultant Theory
...Show More Authors

     This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type:  ,            and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science &amp; Information Technology ( Cs &amp; It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref