DBN Rashid, International Journal of English Linguistics, 2019 - Cited by 2
In this research the behavior of reinforced concrete columns with large side openings under impact loads was studied. The overall cross sectional dimensions of the column specimens used in this research were (500*1400) mm with total height of (14000) mm. The dimensions of side openings were (600*2000) mm. The column was reinforced with (20) mm diameter in longitudinal direction, while (12) mm ties were used in the transverse direction. The effect of eccentric impact loads on the horizontal and vertical displacement for this column was studied. &
... Show MoreGlass Fiber Reinforced Polymer (GFRP) beams have gained attention due to their promising mechanical properties and potential for structural applications. Combining GFRP core and encasing materials creates a composite beam with superior mechanical properties. This paper describes the testing encased GFRP beams as composite Reinforced Concrete (RC) beams under low-velocity impact load. Theoretical analysis was used with practical results to simulate the tested beams' behavior and predict the generated energies during the impact loading. The impact response was investigated using repeated drops of 42.5 kg falling mass from various heights. An analysis was performed using accelerometer readings to calculate the generalized inertial load
... Show MoreA detailed methodology is presented in this paper for the calculation of nucleate boiling safety margin (NBSM) in nuclear research reactors using a temperature function with three different thermal-hydraulic hot-spot analyses: nominal, cumulative and statistical for normal operating condition and coolant flow variation. A computer simulation program is developed for applying the methodology to the IRT-5000 reactor based on experimental core data. According to cumulative analysis as the overconservative approach, the NBSM at normal operating condition of thermal power 5 MW and coolant velocity 1.672 m/s was 2.3% with reactor power limit 5.13 MW. However, during power or coolant flow trip condition, transient nucleate boiling would occur for
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreBackground:sThe aims of this study were to evaluate and compare the ability of three different techniques to obdurate simulated lateral canals, evaluate the effect of the main canal curvature on obturation of lateral canals and compare the gutta-percha penetration between coronal and apical lateral canals. Materials and methods: Resin blocks with 30 straight and 30 curved were used in this study. Each canal has two parallel lateral canals. The main canal has 0.3 mm apical diameter and 0.04 taper. The canals were divided into six groups according to canal curvature and obturation techniques used (n=10): Groups C1 and C2: straight and curved canals obturated with continuous wave technique using E&Q masterTM system. Groups O1 and O2: straight
... Show MoreThe occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MorePV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building 220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More
