Vol. 6, Issue 1 (2025)
Most studies on deep beams have been made with reinforced concrete deep beams, only a few studies investigate the response of prestressed deep beams, while, to the best of our knowledge, there is not a study that investigates the response of full scale (T-section) prestressed deep beams with large web openings. An experimental and numerical study was conducted in order to investigate the shear strength of ordinary reinforced and partially prestressed full scale (T-section) deep beams that contain large web openings in order to investigate the prestressing existence effects on the deep beam responses and to better understand the effects of prestressing locations and opening depth to beam depth ratio on the deep beam performance and b
... Show MoreData scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for
Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreThis project introduces a prospective material for photonic laser applications. The material is olive oil which is classified as organic compound, having a good nonlinear optical properties candidate to be used in photonic applications. A high purity sample of olive oil has been used. The theoretical calculation to generate third harmonic wave using olive oil has been determine using MATLAB program. THG (λ=355nm) intensity has been determined at two cases of sample thicknesses 1mm and 10mm. The minimum threshold incident intensity to obtain THG intensity are equal Iω=7530 mW/cm2 at L=1mm and Iω= 6220 mW/cm2 at L=10mm. The possibility of generation of third harmonic in olive oil inside
... Show MoreIn the present work theoretical relations are derived for the efficiency evaluation for the generation of the third and the fourth harmonics u$ing crystal cascading configuration. These relations can be applied to a wide class of nonlinear optical materials. Calculations are made for beta barium borate (BBO) crystal with ruby laser /.=694.3 nm . The case study involves producing the third harmonics at X. =231.4 nm of the fundamental beam. The formula of efficiency involves many parameters, which can be changed to enhance the efficiency. The results showed that the behavior of the efficiency is not linear with the crystal length. It is found that the efficiency increases when the input power increases. 'I'he walk-off length is calculated for
... Show MoreThis work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.
Iraq has witnessed development in many fields and the electricity production sector is one of the most important of these fields. This is attributed to the State’s philosophy in supporting this sector through the development of economic development projects to serve and raise the level of the Iraqi individual. Electricity production in Iraq is affected by many variables such as load growth, economic and financial conditions, planning, etc. All these led to a disparity in the production of electric power to cover the demand for energy. The paper deals with the electricity generation sector overview in Iraq, Analysis of the effects of variables on the implementation of power generatio
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More