In this study, six square reinforced concrete flat plates with dimensions of (1500×1500×100) mm were tested under a concentrated load applied on a column located at the center of the slabs. One of these slabs was the control specimen, whereas, in the others, steel angles (steel collars) were used, fixed at the connection region between the slab and the column to investigate the effect of the presence of these collars on punching shear strength. Five thicknesses were used (4, 5, 6, 8, 10mm) with constant legs of angles (75×75) mm of the steel collars to investigate the effects on the punching shear resistance with respect to the control slab. The results of the experimental study show that the punching shear resistance increased by 41 to 77% when steel collars were used. The experimental results were in good agreement with the numerical analysis acquired with the ABAQUS software.
The aim of this study is to highlight the relationship between competitive intelligence and Entrepreneurial Performance by centralizing the strategic vigilance of a sample of civil faculties in Baghdad. The sample of the study was targeted at 10 Iraqi civil colleges, which consisted of (133) members of the faculty council of the faculties, the search data was collected using the questionnaire form as the main research tool. The results showed that the correlation and influence of competitive intelligence and strategic vigilance in the Entrepreneurial Performance, as well as the role of strategic vigilance as an intermediate variable between competitive intelligence and Entrepreneurial Performance.
The research aims to: Preparing rehabilitative exercises with accompanying tools to rehabilitate those with shoulder dislocation. Knowing the effect of rehabilitative exercises and accompanying aids in improving the muscular strength and motor range of those with dislocations in the shoulder joint. The two researchers used the experimental design with the same experimental group with the pre and post tests, so the researcher chose a sample appropriate to the nature of his research problem, its goals and its hypotheses, as a sample of the injured was chosen to remove the shoulder joint, who completed the treatment, who were not practicing sports, and those who went to the Physiotherapy Center at Al-Was
... Show MoreThe present work involved a study the effect of cobalt(II) complex with formula [CoL(H2O)NO3] .4ETOH where L=Nitro [5-(P-nitro phenyl) -4-phenyl-1,2,4 traizole-3-dithiocarbamato hydrazide] aqua. (4) Ethanol and anti-cancer drug - cyclophosphamide on specific activity of two liver enzymes (GPT,ALP) by utilizing an in vivo system in female mice. On the enzymatic level an inhibition in the activity of GPT was noticed in different body organs such as liver, kidney and lung. The inhibition was noticed in both test and cyclophosphamide drug (cp). Mice were treated with three doses of cyclophosphamide (90,180, 250) ?g/ mouse for three days. The same doses were used for the cobalt (II) complex. The liver shows the highest rate of(GPT) inhibition co
... Show MoreIn this work, InSe thin films were deposited on glass substrates by thermal evaporation technique with a deposit rate of (2.5∓0.2) nm/sec. The thickness of the films was around (300∓10) nm, and the thin films were annealed at (100, 200 and 300)°C. The structural, morphology, and optical properties of Indium selenide thin films were studied using X-ray diffraction, Scanning Electron Microscope and UV–Visible spectrometry respectively. X-ray diffraction analyses showed that the as deposited thin films have amorphous structures. At annealing temperature of 100°C and 200°C, the films show enhanced crystalline nature, but at 300°C the film shows a polycrystalline structure with Rhombohedral phase with crystallites size of 17.459 nm. Th
... Show Moreأن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخ
... Show MoreIn this study, the turbulent buoyancy driven fluid flow and heat transfer in a differentially heated rectangular enclosure filled with water is quantified numerically. The two dimensional governing differential equations are discretized using the finite volume method. SIMPLE algorithm is employed to obtain stabilized solution for high Rayleigh numbers by a computational code written in FORTRAN language. A parametric study is undertaken and the effect of Rayleigh numbers (1010 to 1014), the aspect ratio (30, 40 and 50), and the tilt angle (10o to 170o ) on fluid flow and heat transfer are investigated. The results of the adopted model in the present work is compared with previously published results and a qualitative agreement and a good
... Show Morecontent Analysis for Some Type of Pillows used in Iraqi houses
This paper presents a stylistic analysis of two poems of well-known poets of the English literature, namely; E.E. Cummings and the Irish noble laureate Seamus Heaney. The researcher's attempt here is to approach Cummings’s poem “maggie and milly and molly and may” and Heaney’s “A Kite for Aibhín” from the stylistics’ point of view. The paper also analyzes the poems using the tools of linguistics with a view to make their meaning explicit.
It is worth noting that stylistics as a scientific discipline is really beneficial to those who are teaching and studyi
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show More