The steel jetty selected for strengthening is in Baghdad city, over Tigris River, consists of 55 short spans, each of approximately 4 meters and one naviga-tional opening of 12 m. The bridge is 224 meters length and 8 meters in width. The strengthening system was designed to remove overstresses that occurred when the bridge was subjected to abnormal loads of 380 tons. A strengthening system which installed in spring 2008 was used where the main concept is to depend on added side supporting elements which impose reversal forces on the bridge to counteract most of the loads expected from the abnormal heavy loads. The bridge was load tested before and after the strengthening system was activated. The load test results indicate that the strengthening system was effective in reducing the overall deformability of the bridge.
Human beings have an innate and natural aim to achieve their self-interests and to show their ability to overcome challenges in a better way, therefore the move towards self determination is expressed by intrinsic motivation. The desire of absorbing in this task is to enjoy the task in it self and benefitting from it such a motivation is the desire rooted in human nature to judge and choose in which individual is conscious in his self, abilities and adequacy that help him in control the different situations of life passed by him. His choices and actions are voluntary and non-restricted to intervention or external control because control is inner and subjective, while his behavior is self-regulated with the feeling of
... Show Moreالذات والتحصيل الدراسي . وقد استخدمت الباحثة المنهج الوصفي التحليلي، وبلغت عينة الدراسة (500) طالبًا وطالبة، تم اختيارهم بالطريقة الطبقية العشوائية وهي تمثل (15%) من مجتمع الدراسة البالغ (3328) طالباً وطالبة من طلبة المرحلة الإعدادية واستخدمت الباحثة مقياسين تم بناء مقياس لقياس الجوهر والمظهر وتبني مقياس فاعلية الذات بعد إن قامت بترجمته وتعريبه وجعله ملائم للبيئة العراقية، كم تم استخراج درجات التحصيل الدراسي للع
... Show MoreWith the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo
In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show More