MRY *Khalid Sh. Sharhan, *Naseer Shukur Hussein, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021
In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThe current study aims to assess zooplankton diversity in Bahr Al-Najaf depression using diversity index, specimens were collected from five sites at Bahr Al-Najaf depression, Iraq during April 2017 to March 2018.
Forty-eight taxa of zooplankton were identified including 26 taxa to Copepoda, 17 taxa belonged to Rotifers and 5 taxa to Cladocera: Copepoda was the most dominant group (54.2%); Rotifera comprised (35.4%); Cladocera comprised (10.4%).
Relative abundance index of zooplankton showed Copepodite and nauplii of Harpacticoid, Hexarthra mira, Daphnia sp., Harpacticoid sp., and Copepodite and nauplii of Cyclops were more abundant. According to the constancy index
... Show MoreThe present study is concerned with Biostratigraphy of the Early-Middle Miocene outcrops of Jeribe Formation in the Zurbatiyah area, Wasit Governorate, Eastern Iraq. Forty-two Samples collected from Shur Sharin and AL-Hashima outcrop sections. The fossil content is rich in large and small benthic foraminifera; Twenty-one species and genus are identified in this study, in addition to coral, gastropoda, pelecypoda, ostracoda, alge, echinoid and shell fragments. According to the presence of benthic foraminifera, two Biozone have been identified in the Jeribe: Austrotrillina asmariensis-Dendritina rangi Concurrent Zone and Borelis melo curdica range zone.The age of the Formation determined as Early-Middle Miocene depending on these Bioz
... Show MoreAbstract Infinitives and gerunds are non-finite verb forms which cannot be indicated by tense, number, or person. The construction of non-finite verbs is intricate because of their nature of meanings, forms, and functions. The major problem is that both infinitival and gerundial complements have identical functions and occupy identical positions in the sentences. Thus, there is a confusion in using an infinitival and gerundial forms after aspectual verbs. The selection of either one of these two forms as complements is controlled syntactically or semantically. Moreover, both forms can be used usually with similar predicate but with neat difference in meaning. In addition, there are problems with controlling the use of aspect, since aspectua
... Show More