Preferred Language
Articles
/
joe-470
Vibration Analysis of a Composite Plate with Delamination
...Show More Authors

The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged multi-layer composite plates are subsequently analyzed for various samples. Also, composite plates are made for vibration testing and analysis and to comparison of the numerical and experimental results, shows good agreement between them.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Dar Amjad For Publishing And Distribution, The Hashemite Kingdom Of Jordan
Statistical Analysis of Non-parametric Tests Using IBM SPSS Statistics Version24
...Show More Authors

أن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخ

... Show More
Publication Date
Fri Jun 02 2023
Journal Name
Alustath Journal For Human And Social Sciences
THE SEMANTIC ANALYSIS OF PHRASAL VERBS IN AMERICAN AND BRITISH TEXTS
...Show More Authors

Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 22 2012
Journal Name
Arabian Journal Of Geosciences
Geohistory analysis and basin development of the Neogene succession, NE Iraq
...Show More Authors

View Publication
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iranian Journal Of Materials Science And Engineering
First-Principles Analysis of Cr-Doped SrTiO3 Perovskite as Optoelectronic Materials
...Show More Authors

The influence of Cr3+ doping on the ground state properties of SrTiO3 perovskite was evaluated using GGA-PBE approximation. Computational modeling results infered an agreement with the previously published literature. The modification of electronic structure and optical properties due to Cr3+ introducing into SrTiO3 were investigated. Structural parameters assumed that Cr3+ doping alters the electronic structures of SrTiO3 by shifting the conduction band through lower energies for the Sr and Ti sites. Besides, results showed that the band gap was reduced by approximately 50% when presenting one Cr3+ atom into the SrTiO3 system and particularly positioned at Sr sites. Interestingly, substituting Ti site by Cr3+ led to eliminating the band ga

... Show More
Scopus (7)
Scopus Clarivate
Publication Date
Tue Oct 01 2024
Journal Name
Science Progress
Jaw vs abdominal Burkitt's lymphoma: An analysis of 25 Iraqi cases
...Show More Authors

This study compared the clinicopathological, immunohistochemical characteristics and Epstein-Barr virus (EBV) detection of Burkitt's lymphoma (BL) in the abdomen and jaw of Iraqi patients. A cohort/retrospective study was carried out between August and September 2024 using 25 tissue blocks (14 gnathic and 11 abdominal BL) from the Oral and Maxillofacial Laboratory, University of Baghdad, College of Dentistry, and the National Centre for Educational Laboratories. The sections were stained with haematoxylin and eosin (H&E), while CD10, CD20, Bcl-2, BCl-6, C-Myc and Ki-67 markers were used for diagnosis. The DNA detection of the EBV was performed by polymerase chain reaction (PCR). The tumours showed 22 classical and 3 atypical histologi

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue May 11 2021
Journal Name
Egyptian Journal Of Medical Human Genetics
Molecular analysis of CFTR gene mutations among Iraqi cystic fibrosis patients
...Show More Authors
Abstract<sec> <title>Background

Cystic fibrosis (CF) is an autosomal recessive multisystem disease that results from mutation(s) of the cystic fibrosis transmembrane conductance regulator (CFTR) gene. More than 2100 mutations and polymorphisms have been reported in this gene so far. Incidence and genotyping of CF are under-identified in Iraq. This study aims to determine the types and frequencies of certain CFTR mutations among a sample of Iraqi CF patients. Two groups of patients were included: 31 clinically confirmed CF patients in addition to 47 clinically suspected patients of CF. All confirmed pa

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Experimental and Numerical Analysis of Incompressible Flow over an Iced Airfoil
...Show More Authors

Determining the aerodynamic characteristics of iced airfoil is an important step in aircraft design.  The goal of this work is to study experimentally and numerically an iced airfoil to assess the aerodynamic penalties associated with presence of ice on the airfoil surface. Three iced shapes were tested on NACA 0012 straight wing at zero and non-zero angles of attack, at Reynolds No. equal to (3.36*105). The 2-D steady state continuity and momentum equations have been solved utilizing finite volume method to analyze the turbulent flow over a clean and iced airfoil. The results show that the ice shapes affected the aerodynamic characteristics due to the change in airfoil shape. The experimental results show that the horn iced airfoil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Jul 05 2023
Journal Name
Journal Of Pragmatics Research
Analysis of Impoliteness Strategies Used in Putin's Speech at Annexation Ceremony
...Show More Authors

This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most

... Show More
View Publication Preview PDF
Crossref (1)
Crossref