A ‘locking-bolt’ demountable shear connector (LBDSC) is proposed to facilitate the deconstruction and reuse of steel-concrete composite structures, in line with achieving a more sustainable construction design paradigm. The LBDSC is comprised of a grout-filled steel tube and a geometrically compatible partially threaded bolt. The latter has a geometry that ‘locks’ the bolt in compatible holes predrilled on the steel flange and eliminates initial slip and construction tolerance issues. The structural behaviour of the LBDSC is evaluated through nine pushout tests using a horizontal test setup. The effects of the tube thickness, strength of concrete slab, and strength of infilled grout on the shear resistance, initial stiffness, and du
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Hypothyroidism is the most prevalent thyroid disorders worldwide. Hypothyroidism manifestations are wide spectrum, affecting various systems in human body including the nervous system. Hypothyroidism can cause neuropsychiatric symptoms such as anxiety, depression and diminishing in attention, memory and executive function. Aim: to investigate the level of anxiety and depression in patients with hypothyroidism receiving levothyroxine treatment. Method: a cross-sectional study was conducted at Baghdad Center for Nuclear Medicine and Radiation Therapy from March to June 2022. The study population included patients of both genders, aged 18-65 years, diagnosed with hypothyroidism, were receiving levothyroxine treatment and
... Show MoreThe research work was conducted to investigate the effect of oral administration of water extract of black pepper at doses of (1, 5) mg/kg body weight for two weeks daily by determining the genotoxic effect (mitotic index), evaluation of immunological effect (IgG, IgM, IgA, C3, C4) and measuring fertility hormones (follicles stimulation hormone/FSH, lutenising hormone/LH) levels with histopathological examinations of female albino swiss mice ovaries in comparison with control (normal saline). A clear effect in increasing mitotic activity was reveled for both doses in comparison with control. Results also showed a significant increase in the value of the all immunological parameters at both doses in comparison with control. Also obvious rais
... Show MoreSince the invention of the automobile, no aspect of American life, including crime and its control, has remained untouched by this far-reaching innovation in transportation. Vehicular "hot pursuit"-when suspects in motor vehicles use excessive speed in attempting to elude the police. Unfortunately, accounts of wild chases across crowded inner city streets, through tree-lined suburban boulevards, and over remote country roads are very real and not merely fictional material created for entertaining television and motion picture audiences. The specter of "hot pursuit," complete with screaming sirens and red or blue flashing lights, has become a recurring fact of modem life.1 So, too, are the mishaps involving police vehicles or the vehicles pu
... Show MoreThe aim of the research is to identify the role of public relations in promoting tourism by the Palestinian tourism and travel companies in Gaza from the public relations officer’s point of view in those companies.
The researcher used the descriptive analytical method as the most appropriate for such studies and implemented the questionnaire as a tool to obtain the required data from the respondents.
The Researcher reached several conclusions:
1- There is a low percentage of women working in the field of public relations in Palestinian tourism establishments in the Gaza Strip, where the percentage did not exceed 5%.
2- The interpersonal communication counted as one of the elements of integra
The - mixing ratios of -transitions from levels in populated in the reactions are calculated in present work using - ratio, constant statisticalTensor and least squares fitting methods The results obtained are in general, in good agreement or consistent, within the associated uncertainties, with these reported in Ref.[9],the discrepancies that occurs are due to inaccuracy existing in the experimental data The results obtained in the present work confirm the –method for mixed transitions better than that for pure transition because this method depends only on the experimental data where the second method depends on the pure or those considered to be pure -transitions, the same results occur in – method