Preferred Language
Articles
/
kBca3ZEBVTCNdQwCBJsd
Removable shear connector for steel-concrete composite bridges
...Show More Authors

The conception and experimental assessment of a removable friction-based shear connector (FBSC) for precast steel-concrete composite bridges is presented. The FBSC uses pre-tensioned high-strength steel bolts that pass through countersunk holes drilled on the top flange of the steel beam. Pre-tensioning of the bolts provides the FBSC with significant frictional resistance that essentially prevents relative slip displacement of the concrete slab with respect to the steel beam under service loading. The countersunk holes are grouted to prevent sudden slip of the FBSC when friction resistance is exceeded. Moreover, the FBSC promotes accelerated bridge construction by fully exploiting prefabrication, does not raise issues relevant to precast construction tolerances, and allows rapid bridge disassembly to drastically reduce the time needed to replace any deteriorating structural component (e.g., the bridge deck). A series of 11 push-out tests highlight why the novel structural details of the FBSC result in superior shear load-slip displacement behavior compared to welded shear studs. The paper also quantifies the effects of bolt diameter and bolt preload and presents a design equation to predict the shear resistance of the FBSC.

Scopus Clarivate
View Publication
Publication Date
Fri Oct 25 2013
Journal Name
International Endodontic Journal
Fabrication and characterization of polymer composites for endodontic use
...Show More Authors

Aim To develop a low-density polyethylene–hydroxyapatite (HA-PE) composite with properties tailored to function as a potential root canal filling material. Methodology Hydroxyapatite and polyethylene mixed with strontium oxide as a radiopacifier were extruded from a single screw extruder fitted with an appropriate die to form fibres. The composition of the composite was optimized with clinical handling and placement in the canal being the prime consideration. The fibres were characterized using infrared spectroscopy (FTIR), and their thermal properties determined using differential scanning calorimetry (DSC). The tensile strength and elastic modulus of the composite fibres and gutta-percha were compared, dry and after 1 month storage in

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Quality of Life Assessment for Patients with Colorectal Cancer
...Show More Authors

Abstract A descriptive study to assess the quality of life (QOL) for patients with colorectal cancer. The study was conducted from Baghdad Teaching Hospital, Al-Yarmouk Teaching Hospital and Radiation Hospital and Nuclear medicine for the period from 1st July/2004 to 1st September/2004. The sample selected by purposive random of (50) patients diagnosed with colorectal cancer and all of them who were under chemotherapy treatment. A questionnaire was prepared for the purpose of the study and comprised of three parts including: 1- Socio-demographical characteristics. 2- Clinical characteristics. 3- and QOL

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 03 2025
Journal Name
Journal Of Engineering
Correction Procedure for the Determination of Soil Specific Surface
...Show More Authors

View Publication
Publication Date
Thu Feb 11 2021
Journal Name
Physics In Medicine & Biology
Stereoscopic portable hybrid gamma imaging for source depth estimation
...Show More Authors
Abstract<p>Advances in gamma imaging technology mean that is now technologically feasible to conduct stereoscopic gamma imaging in a hand-held unit. This paper derives an analytical model for stereoscopic pinhole imaging which can be used to predict performance for a wide range of camera configurations. Investigation of this concept through Monte Carlo and benchtop studies, for an example configuration, shows camera-source distance measurements with a mean deviation between calculated and actual distances of <5 mm for imaging distances of 50–250 mm. By combining this technique with stereoscopic optical imaging, we are then able to calculate the depth of a radioisotope source beneath a surfa</p> ... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Gazi University Journal Of Science
Reliable Iterative Methods for Solving the Falkner-Skan Equation
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Sat Mar 20 2021
Journal Name
Agroforestry Systems
Hydraulic lift: processes, methods, and practical implications for society
...Show More Authors

View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Runge-kutta Numerical Method for Solving Nonlinear Influenza Model
...Show More Authors
Abstract<p>The main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.</p>
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref