Preferred Language
Articles
/
joe-54
Free Vibration Analysis of Laminated Composite plates with General Elastic Boundary Supports
...Show More Authors

In this investigation, Rayleigh–Ritz method is used to calculate the natural frequencies of rectangular isotropic and laminated symmetric and anti-symmetric cross and angle ply composite plate with general elastic supports along its edges. Each of the admissible functions here is composed of a trigonometric function and an arbitrary continuous function that is introduced to ensure the sufficient smoothness of the so-called residual displacement function at the edges. Perhaps more importantly, this study has developed a general approach for deriving a complete set of admissible functions that can be applied to various boundary conditions. Several numerical examples are studied to demonstrate the accuracy and convergence of the current solution with considering some design parameters such as boundary conditions, aspect ratio, lamination angle, thickness ratio, orthotropy ratio, also these results are compared with other researchers and give a good agreement .
 
 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Employ benchmarking to Appraisal the performance of employees in achieving the total quality of human resources requirements - applied research in the Office of the Inspector General / Martyrs Foundation
...Show More Authors

This research aims to determine the role of employee performance evaluation of the achievement of the quality of human resources in the Office of the Inspector General / Martyrs Foundation requirements by employing comparison steps reference with the Office of the Inspector General / Ministry of Higher Education and Scientific Research, has been touching the researchers need the Office of the Inspector General / Martyrs Foundation to apply assess the performance is good for workers and the employment of its outputs to achieve the requirements of the above-mentioned system, and in order to stand on this role we raised the following question President: (is the quality of human resources requirements are achieved through the employm

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Towards building an educational system free of scientific corruption (Applied study in a sample of colleges of higher education in Iraq within the framework of the government program and the directions of the Supreme Council for Combating Corruption)
...Show More Authors

Nations are developed with education and knowledge that raise the status of society in its various segments, beyond that it leads to underdevelopment and deterioration in various sectors, whether economic, health, social, etc. If we considered the general name of The ministry of Education & Scientific Studies, then the second part seems to be not functioning, since scientific research has no material allocation and remains based on the material potential of the university professor. As for the first half of the topic, the reality of the situation reveals problems related to the Holy Trinity of Education which is (Professor - Student - the scientific method) where universities suffer at the present time from this problem, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Spatial and Temporal Analysis of Severe Dust Storm in Iraq in May 2022
...Show More Authors

Dust storms are a common ecological occurrence in many world‘s countries, mainly in dry and semi-dry parts. Dust storms tremendously influence human health, the environment, the climate, and numerous social aspects. In this paper, spatial and temporal analysis, metrological triggers, and trajectory, dust exporting areas of a severe dust storm that occurred in Iraq on May 16, 2022, were investigated. The dust storm's backward trajectory was determined using HYSPLIT model, which is then compared with MODIS and Meteosat satellite images. The weather is then analyzed using the NCEP/NCAR Reanalysis model, and the approximate area of these sources was determined using Landsat 8 satellite image classification method. The results revealed

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Entransy dissipation of Shell and Double Concentric Tube Heat Exchanger Calculations and Analysis
...Show More Authors

Shell-and-double concentric tube heat exchanger is one of the new designs that enhance the heat transfer process. Entransy dissipation is a recent development that incorporates thermodynamics in the design and optimization of heat exchangers. In this paper the concept of entransy dissipation is related to the shell-and-double concentric tube heat exchanger for the first time, where the experiments were conducted using hot oil with temperature of 80, 100 and 120°C, flow rate of cold water was 0.667, 1, and 1.334 kg/m3 respectively and the temperature of inlet cold water was 20°C. The entransy dissipation rate due to heat transfer and to fluid friction or pressure drop was studied.

 

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
An excerpt on the analysis of correlate constructions: Exkurs zur Analyse der Korrelatkonstruktionen
...Show More Authors

The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Modeling and analysis of thermal contrast based on LST algorithm for Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Mar 29 2024
Journal Name
مجلة العلوم التربوية والنفسية
Needs in the stories of the Brothers Grimm (a study in content analysis)
...Show More Authors

The current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw

... Show More
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
discriminate analysis and logistic regression existence of multicolleniarty problem(Empirical Study on Anemia)
...Show More Authors

The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.

In this, search the comparison between binary lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref