Preferred Language
Articles
/
rhZsCocBVTCNdQwCYDEL
Influence of CFRP Strengthening on the Behavior of Concavely-Curved Soffit Concrete Bridge Girders
...Show More Authors
Abstract<p>Over the last few decades, fiber reinforced polymer (FRP) has been increasingly used in strengthening different structural concrete members. The main objective of this research is to study the influence of curvature on the performance of curved soffit reinforced concrete (RC) bridge girders that have been strengthened with carbon fiber reinforced polymers (CFRP). This experimental program was designed to evaluate the effect of concavity and soffit curvature on the CFRP laminate utilization and load capacity, compared to flat soffit RC beams strengthened with the same CFRP system. Accordingly, five beams, 2.7 m in length and having the same degree of soffit curvature (20 mm per 1 meter) extending over 2 meters of the span length, were tested under three-point monotonic static loading up to failure. CFRP pre-cured laminates were used for external strengthening in flexure. It was observed that 20 mm/m degree of curvature reduced the load-carrying capacity of strengthened concavely curved RC beams by 15.9 – 17.8%.</p>
Scopus Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Applying A* Path Planning Algorithm Based on Modified C-Space Analysis
...Show More Authors

In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Apr 30 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Biochemical Study on Splenectomy and Non Splenectomy Iraqi Major Thalassemic Patients
...Show More Authors

Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
The Ocular Surface
Detecting dry eye from ocular surface videos based on deep learning
...Show More Authors

View Publication
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Wind Interference Effect for Overall Design Load on Mid-Rise Building
...Show More Authors

The constructed building in the urban area is subject to wind characteristics due to the influence of surrounding buildings. The residential complexes currently being built in Iraq represent a case study for the subject of this research. Therefore, the objective of this study is to identify the interference effect because of adjacent buildings effects on the mid-rise building. The speed and pressure of the wind have been numerically simulated as well as wind load has been simulated by using a virtual wind tunnel which is available in Autodesk Robot Structural Analysis, RSA, software. Two identical adjacent buildings have been simulated and many coefficients were included in this study such as the spacing, directionality,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 30 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Damage pattern scope prediction for well point dewatering on building foundations
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Wed Oct 10 2018
Journal Name
Commun.fac.sci.univ.ank.series A2-a3
ULTRAHIGH SENSITIVE REFRACTIVE INDEX SENSOR BASED ON TAPERED MULTICORE OPTICAL FIBER
...Show More Authors

The refractive index sensors based on tapered optical fiber are attractive for many industries due to sensing capability in a variety of application. In this paper, we proposed a refractive index sensor based on multicore fiber (MCF) sandwiched between two standard single mode fibers (SMF). The sensor consisting of three sections, SMF- MCF-SMF is structurally simple and can be easily produced by joining these parts. The MFC contains seven cores and these cores are surrounded by a single cladding. The sensing region is obtained by tapering the MCF section where the evanescent field is generated. The single mode propagating along the SMF is stimulated at the first joint and is coupled to the cladding modes. These modes interfere with the core

... Show More
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (19)
Crossref (10)
Scopus Crossref