Preferred Language
Articles
/
joe-470
Vibration Analysis of a Composite Plate with Delamination
...Show More Authors

The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged multi-layer composite plates are subsequently analyzed for various samples. Also, composite plates are made for vibration testing and analysis and to comparison of the numerical and experimental results, shows good agreement between them.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
A study in Tunisian - Iraqi Relations and its role in determining strategies for dealing with conflict and peace situations
...Show More Authors

If the State attaches great importance to its foreign relations and intends to strengthen them in order to ensure the achievement of the highest national goals and interests. External relations between countries are one of the most prominent features of foreign policy, which depends on a combination of internal and external factors, the modern relations between Tunisia and Tunisia, which goes back to the pre-independence of Tunisia, when Iraq was a supporter of Tunisia's independence from France in the 1940s, Although these relations did not cause any disturbance by the two countries, but they remained weak relations did not develop in all areas except the sports and cultural field, which we will determine the reasons and the pos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 17 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study Using the Passive Solar Chimney for Evaporative Cooling With PCM and CFM as a Thermal Energy Storage
...Show More Authors

 

      In this work, a test room was built in Baghdad city, with (2*1.5*1.5) m3  in dimensions, while the solar chimneys (SC) were designed with aspect ratio (ar) bigger than 12. Test room was supplied by many solar collectors; vertical single side of air pass with ar equals 25, and tilted 45o double side of air passes with ar equals 50 for each pass, both collectors consist of flat thermal energy storage box collector (TESB) that covered by transparent clear acrylic sheet, third type of collector is array of evacuated tubular collectors with thermosyphon in 45o instelled  in the bottom of TESB of vertical SC. The TESB was

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 03 2021
Journal Name
021 8th International Conference On Computing For Sustainable Global Development (indiacom)
Tilting-rotors Quadcopters: A New Dynamics Modelling and Simulation based on the Newton-Euler Method with Lead Compensator Control
...Show More Authors

Scopus (17)
Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Advances On Computational Intelligence In Energy
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
...Show More Authors

Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Statistical Sciences
Use the robust RFCH method with a polychoric correlation matrix in structural equation modeling When you are ordinal data
...Show More Authors

View Publication
Crossref
Publication Date
Wed Oct 21 2015
Journal Name
Integrated Journal Of Engineering Research And Technology
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.

Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Enhancing Smart Cities with IoT and Cloud Computing: A Study on Integrating Wireless Ad Hoc Networks for Efficient Communication
...Show More Authors

Smart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
Comparison between Reference Infliximab (Remicade) and its Biosimilar (Remsima) in Patients with Ankylosing Spondylitis: A Field-based Pharmacoeconomic Study
...Show More Authors

Background: Ankylosing spondylitis is a chronic inflammatory disease that mostly involves the spine and sacroiliac joints. It is associated with a decreased quality of life. Biological medicines such as infliximab and its biosimilar are the mainstay treatments for active ankylosing spondylitis.

Objective: The study objective was to conduct a pharmacoeconomic study comparing the cost-effectiveness of the reference infliximab with its biosimilar in ankylosing spondylitis patients visiting public hospitals.

Subjects and Method: This is a two-center pharmacoeconomic study performed at two large teaching governmental hospitals in Baghdad, Iraq, which s

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the theoretical framework of the REA accounting model Used in the design of accounting information systems
...Show More Authors

Researchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It als

... Show More
View Publication Preview PDF
Crossref