The accurate identification of internal and external pressures in thick-walled hyperelastic vessels is a challenging inverse problem with significant implications for structural health monitoring, biomedical devices, and soft robotics. Conventional analytical and numerical approaches address the forward problem effectively but offer limited means for recovering unknown load conditions from observable deformations. In this study, we introduce a Graph-FEM/ML framework that couples high-fidelity finite element simulations with machine learning models to infer normalized internal and external pressures from measurable boundary deformations. A dataset of 1386 valid samples was generated through Latin Hypercube Sampling of geometric and loading parameters and simulated using finite element analysis with a Neo-Hookean constitutive model. Two complementary neural architectures were explored: graph neural networks (GNNs), which operate directly on resampled and feature-enriched boundary data, and convolutional neural networks (CNNs), which process image-based representations of undeformed and deformed cross-sections. The GNN models consistently achieved low root-mean-square errors (≈0.021) and stable correlations across training, validation, and test sets, particularly when augmented with displacement and directional features. In contrast, CNN models exhibited limited predictive accuracy: quarter-section inputs regressed toward mean values, while full-ring and filled-section inputs improved after Bayesian optimization but remained inferior to GNNs, with higher RMSEs (0.023–0.030) and modest correlations (R2). To the best of our knowledge, this is the first work to combine boundary deformation observations with graph-based learning for inverse load identification in hyperelastic vessels. The results highlight the advantages of boundary-informed GNNs over CNNs and establish a reproducible dataset and methodology for future investigations. This framework represents an initial step toward a new direction in mechanics-informed machine learning, with the expectation that future research will refine and extend the approach to improve accuracy, robustness, and applicability in broader engineering and biomedical contexts.
The presence and prevalence of V. cholerae were investigated in forty five water samples collected from different locations of Tiger River/ Baghdad city. Twenty one isolates were isolated by adopting a simple isolation techniques. The final identification revealed that only three isolates were confirmed as V. cholerae. They were named 1J, 1R and Dial 131 which are all serogrouped as non-O1. Toxin Coregulated Pili (TCP) and heat labile enterotoxin (LT) were determined in only the environmental isolate 1J while non of the isolates produced heat stabile toxin (ST). The purification scheme was improved, few steps were adopted to include back extraction of ammonium sulfate, saturation between 80-20%, desalting through Sephadex G25, and gel filt
... Show MoreBackground: This in vitro study compares a self-etch primer (SEP) to an etch-and-rinse (EaR) for bonding sapphire brackets by evaluation of the enamel etch-pattern, shear bond strength, amount of remnant adhesive and enamel surface damage following thermal and fatigue cyclic loading. Material and Methods: Ceramic (sapphire) brackets were bonded to 80 extracted human premolars using two enamel etching protocols: conventional EaR using 37% phosphoric acid (PA) gel (control), and a SEP (Transbond Plus). Each group was subdivided into two subgroups (n=20 teeth) according to the time of bracket debonding: after 24 h water storage or following 5000 thermo-cycles plus 5000 cycles fatigue loading, to determine the shear bond strength (SBS), adhesiv
... Show MoreThe study is situated in the Kokoe Region of Central Buton Regency, Southeast Sulawesi, specifically in the southern part of Kabaena Island. Its primary objective is to assess the potential of nickel laterite in the designated area. The research methodology involved microscopic analysis of bedrock using a polarizing microscope, examining the drilling data, including logging descriptions, and utilizing XRF geochemical analysis (Ni, Fe, Al2O3, Co, Mg, and SiO2) from 32 drilling sites. Both elementary grade and laterite profiles were visualized using Strater 5 software to simplify the representation of laterite profiles. Petrographic analysis divided the bedrock into two lithological units: serpentinized lherzolite and serpentinite. Th
... Show MoreThe guava plant, Psidium guajava L., serves as proof of the abundant donations of nature, providing a delicious guava fruit; this plant is rich in groups of medicinal and nutritional benefits. Guava belonging to the Myrtaceae family, many previous studies reported many phytochemical constituents in its leaves that have many pharmacological activities and medicinal properties; this study focuses on the isolation, structural elucidation and calculation concentration of flavonoids, assessment of the cytotoxic activityof hyperin from Psidium guajava leaves newly cultivated in Iraq. The isolation process involved the use of thin-layer chromatography (TLC) and preparative high-performance liquid chromatography (PHPLC) and structural eluci
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Background: The association of olanzapine with hyperglycemia, an elevated lipid profile, and high blood pressure was early recognized after its approval and has become of increased concern. Objective: To determine the association of olanzapine use with blood sugar levels, lipid profiles, and blood pressure in hospitalized Iraqi patients with schizophrenia. Methods: A cross-sectional study involving 50 hospitalized patients with schizophrenia who met the Diagnostic and Statistical Manual of Mental Disorders (DSM)-V diagnostic criteria and had taken olanzapine for at least two years was carried out between November 2022 and February 2023 at two facilities in Baghdad, Iraq (Ibn Rushd Psychiatric Teaching Hospital and Al Rashad Hospital
... Show MoreThis paper studied the behaviour of reinforced reactive powder concrete (RPC) two-way slabs under static load. The experimental program included testing three simply supported slabs of 1000 mm length, 1000 mm width, and 70 mm thickness. Tested specimens were of identical properties except their steel fibers volume ratio (0.5 %, 1 %, and 1.5 %). Static test results revealed that, increasing steel fibers volume ratio from 0.5% to 1% and from 1% to 1.5%, led to an increase in: first crack load by (32.2 % and 52.3 %), ultimate load by (36.1 % and 17.0 %), ultimate deflection by (33.6 % and 3.4 %), absorbed energy by (128 % and 20.2 %), and the ultimate strain by (1.1 % and 6.73 %). The stiffness and ductility of the specimens also increased. A
... Show More