Preferred Language
Articles
/
lhef3ZEBVTCNdQwCSptG
16.15: Experimental evaluation of a novel demountable shear connector for accelerated repair or replacement of precast steel‐concrete composite bridges
...Show More Authors

A novel demountable shear connector for precast steel‐concrete composite bridges is presented. The connector uses high‐strength steel bolts, which are fastened to the top flange of the steel beam with the aid of a special locking nut configuration that prevents slip of bolts within their holes. Moreover, the connector promotes accelerated construction and overcomes typical construction tolerances issues of precast structures. Most importantly, the connector allows bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (i) precast deck panels can be rapidly uplifted and replaced; (ii) connectors can be rapidly removed and replaced; and (iii) steel beams can be replaced, while precast decks and shear connectors can be reused. A series of push‐out tests are conducted to assess the behavior of the connector and quantify the effect of important parameters. The experimental results show shear resistance, stiffness, and slip capacity significantly higher than those of welded shear studs along with superior stiffness and strength against slab uplift. Identical tests reveal negligible scatter in the shear load – slip displacement behavior. A design equation is proposed to predict the shear resistance with absolute error less than 8%.

Crossref
View Publication
Publication Date
Tue Dec 11 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of accounting disclosure in the size of the risks or return for portfolio insurance: An applied research at the national insurance company
...Show More Authors

This research aims to numerous risks to the portfolio of the insurance company that arise from practicing the activity in general, and the risks arising from insurance contracts in particular, and what is the role of the company in the disclosure to help users (such as owners) to understand and concentration of risks in the financial reporting and identifying movable risks size to reinsurers that may affect the solvency of the portfolio and makes them at a given moment required to fulfill the obligations towards policyholders outweigh the financial capacity, which leads to stumble or bankruptcy.

So I sought this research is to identify the extent of the obligation to disclose the accounting for this risk and the extent of their i

... Show More
View Publication
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Physica Medica
Quantitative analysis of sentinel lymph node detection using a novel small field of view hybrid gamma camera (HGC)
...Show More Authors

Introduction The Hybrid Gamma Camera (HGC) is being developed to enhance the localisation of radiopharmaceutical uptake in targeted tissues during surgical procedures such as sentinel lymph node (SLN) biopsy. Purpose To assess the capability of the HGC, a lymph-node-contrast (LNC) phantom was constructed for an evaluative study simulating medical scenarios of varying radioactivity concentration and SLN size. Materials and methods The phantom was constructed using two methyl methacrylate PMMA plates (8 mm thick). The SLNs were simulated by drilling circular wells of diameters ranging between 10 mm and 2.5 mm (16 wells in total) in one plate. These simulated SLNs were placed underneath scattering material with thicknesses ranging between 5 mm

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Craniofacial Surgery
Novel Application of Platelet-Rich Fibrin as a Wound Healing Enhancement in Extraction Sockets of Patients Who Smoke
...Show More Authors

View Publication
Crossref (23)
Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Numerical Investigation for Simulation of Thermophysical Properties for Polypropylene 575 Polymer Melts in Single Screw Extruder
...Show More Authors

A numerical model for Polypropylene 575 polymer melts flow along the solid conveying screw of a single screw extruder under constant heat flux using ANSYS-FLUENT 17.2 software has been conducted. The model uses the thermophysical properties such as Viscosity, thermal conductivity, Specific heat and density of polypropylene 575 that measured as a function of temperature, and residence time data for process simulation. The numerical simulation using CFD models for single screw extruder and the polymer extrusion was analysed for parameters such as (thermal conductivity, specific heat, density and viscosity) reveals a high degree of similarity to experimental data measured. The most important outcome of this study is that geometrical, parame

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (31)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses knowledge toward prevention of Complications related Valvular Replacement Surgery at Surgical Department in AL-Nasiriyah Heart Center
...Show More Authors

Objectives: The study aims to assess  the nurses knowledge toward prevention of complications related to valvular  replacement surgery and to find out the relationship between nurses knowledge and their demographic and occupational characteristic's Which as (Age, gender, level of education ,years of experience in Surgical Department , and training sessions)

 

Methodology: A descriptive design  (a cross-sectional study ) was carried out from December 2017 to May 2018 in order to assess nurses' knowledge of preventing complications Valvular Replacement Surgery at Surgical Department in  Nasiriyah Heart Center on a purposive (non-probability) sample

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 13 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Congenitally missing and supernumerary teeth among a group of 3-12 years old children with cleft lip and/ or palate in Iraq
...Show More Authors

Background: There are many congenital anomalies associated with cleft lip and/or palate. This research is to study the prevalence of congenitally missing teeth and supernumerary teeth in this population group. Materials and Method: One hundred eight cleft lip and/or palate Iraqi patients had participated in this study (57 male, 51 female), 3-12 years of age. 26 of them had orthopantomogram were within (6-12) years of age were inspected for congenitally missing teeth and supernumerary teeth. Patients whom age range 3-5 years were checked for the congenitally missing teeth by clinical examination with strongly insisting the teeth were not missed due to caries or trauma. Results: There were 19(73.076%) patients with 41 congenitally missing tee

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Chemical Engineering Research And Design
Treatment of petroleum refinery wastewater by electrofenton process using a low cost porous graphite air-diffusion cathode with a novel design
...Show More Authors

View Publication
Scopus (30)
Crossref (30)
Scopus Clarivate Crossref