This paper studies the effects of stiffeners on shear lag in steel box girders with stiffened flanges. A three-dimensional linear finite element analysis using STAAD.Pro V8i program has been employed to evaluate and determine the actual top flange stress distribution and effective width in steel box girders. The steel plates of the flanges and webs have been modeled by four-node isoparametric shell elements, while the stiffeners have been modeled as beam elements. Different numbers (4, 8, and 15) for the steel stiffeners have been used in this study to establish their effects on the shear lag and longitudinal stresses in the flange. Using stiffeners reduced the magnitude of the top flange longitudinal stresses about 40%, but didn’t affect the shear lag.
The cheif aim of the present investigation is to develop Leslie Gower type three species food chain model with prey refuge. The intra-specific competition among the predators is considered in the proposed model. Besides the logistic growth rate for the prey species, Sokol Howell functional response for predation is chosen for our model formulation. The behaviour of the model system thoroughly analyses near the biologically significant equilibria. The linear stability analysis of the equilibria is carried out in order to examine the response of the system. The present model system experiences Hopf bifurcation depending on the choice of suitable model parameters. Extensive numerical simulation reveals the validity of the proposed model.
The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreImaging by Ultrasound (US) is an accurate and useful modality for the assessment of gestational age (GA), estimation fetal weight, and monitoring the fetal growth during pregnancy, is a routine part of prenatal care, and that can greatly impact obstetric management. Estimation of GA is important in obstetric care, making appropriate management decisions requires accurate appraisal of GA. Accurate GA estimation may assist obstetricians in appropriately counseling women who are at risk of a preterm delivery about likely neonatal outcomes, and it is essential in the evaluation of the fetal growth and detection of intrauterine growth restriction. There are many formulas are used to estimate fetal GA in the world, but it's not specify fo
... Show MoreThe aim of this research is to apply Throughput Accounting in improving the cost leadership strategy for the woven fabric department (polyester blended - polyester 150/1) in the Waist Textile and Knitting Factory. The problem of the research is that the research sample laboratory does not apply modern cost management methods represented in Throughput Accounting, as the Iraqi economic units suffer from their inability to compete in the labor market in light of the competitive environment. The Ministry of Interior improved the cost leadership strategy for the product of blended polyester and polyester fabrics 1/150. Through the research, a set of conclusions was reached, the most important of which are: Improving the cost lea
... Show Moreobjective the research to diagnosis and interpretation of the nature of the correlation between the basic elements of knowledge management (tecgnology , structure , culture , process , human resource ) and the strategic performance of the Iraqi private banks, the research community and the level dimensions, and tested this research in the private banking sector represented by (7), especially in Baghdad city, Iraqi banks, and applied on sample consisting of 100 distributors in several administrative levels Director (Director, Director of the department, branch manager), and use questionnaire Head to collect data and information tool, and some private banks annual reports, has sought research to test a number of h
... Show MoreThe research addressed the formal functions resulting from the use of various guiding signs in the design of the interior spaces of airports in various pragmatic, expressive and psychological aspects. The aim is to identify the functions the guiding signs perform in facilitating and organizing the travelers' movement and satisfying the needs of the visitors and users of the unfamiliar places which they intend to visit, the nature of the services offered by these signs as one of the important parts within their general design. The research also identified the concept and types of signs as a means of visual communication and how to employ them in the design of the airports public spaces, and what are the criteria of their use and fu
... Show MoreThe main idea of this research stems from the challenges faced by managers working in service organizations, which are responsible for providing services to a large segment of the society. Therefore, they must use strategic intelligence to manage their performance and enhance their performance to serve the society. Organizational Performance The present study aimed to identify the concepts of strategic intelligence and its impact on organizational performance to raise awareness and awareness of the importance of the subject for the university. And to identify the perceptions of leaders about strategic intelligence and determine the nature of the relationship (impact and correlation) between strategic inte
... Show More