A few examinations have endeavored to assess a definitive shear quality of a fiber fortified polymer (FRP)- strengthened solid shallow shafts. Be that as it may, need data announced for examining the solid profound pillars strengthened with FRP bars. The majority of these investigations don't think about the blend of the rigidity of both FRP support and cement. This examination builds up a basic swagger adequacy factor model to evaluate the referenced issue. Two sorts of disappointment modes; concrete part and pulverizing disappointment modes were examined. Protection from corner to corner part is chiefly given by the longitudinal FRP support, steel shear fortification, and cement rigidity. The proposed model has been confirmed utilizing an aggregate of 45 databases gathered from writing. Results show that the proposed model can evaluate a definitive shear quality. Structure of trial (DOE) programming was used to examine the impact of different parameter esteems on a definitive shear quality limit. The outcomes demonstrate that the shear range to powerful profundity proportion has the most astounding impact contrasted and alternate parameters.
The aim of this research is to examine the relationship between entrepreneurial mindset and aspiration and small business performance Baghdad, Iraq. This study proposed a quantitative analysis in which entrepreneurial mindset and aspiration is a critical success factor of small business in Iraq. The method employed in the collection of data was by the means of self-administered questionnaire which was filled and completed by small business owners randomly selected from a sampling frame of registered small businesses. The questionnaire was adapted from the study of Davis, Halls & Mayer (2015) and Abdel-Maksoud, Asada & Nakagawa (2008) which was used to measure entrepreneurial mindset and aspiration using a ten items scale and small business
... Show MoreThe dynamic behavior of laced reinforced concrete (LRC) T‐beams could give high‐energy absorption capabilities without significantly affecting the cost, which was offered through a combination of high strength and ductile response. In this paper, LRC T‐beams, composed of inclined continuous reinforcement on each side of the beam, were investigated to maintain high deformations as predicted in blast resistance. The beams were tested under four‐point loading to create pure bending zones and obtain the ultimate flexural capacities. Transverse reinforcement using lacing reinforcement and conventional vertical stirrups were compared in terms of deformation, strain, and toughness changes of the tes
Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Dens itiad ns vcovadoay fnre Dec2isco0D,ia asrn2trcds4 fenve ns 6ocfo ts ida%n2notd, rasr sedno6t(a asrn2trcd fnre sc2a 2cynwnvtrnco co nrs wcd2 /nt sedno6t(a fan(er wtvrcd ﯿ)ﺔ mh Dens r,ia cw asrn2trcds et/a laao vcosnyaday wcd asrn2trno( rea itdt2arads ﻘ cw sn2i%a %noatd da(dassnco 2cya%4 feao t idncd asrn2tra cw rea itdt2arad /t%ua )ﻘm ns t/tn%tl%a4 st, ﻘxh Dens ﻘx ets laao dawadday no srtrnsrnvt% %nradtrudas ts (uass icnor tlcur rea itdt2arad ﻘh Dea aMidassncos wcd Snts4 Oato -9utday 8ddcd )O-8m toy .a%trn/a 8wwnvnaov, cw rea idcicsay asrn2trcds tda clrtnoayh 1u2adnvt% dasu%rs tda idc/nyay feao rea
... Show MoreVol. 6, Issue 1 (2025)