In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated
... Show More
This paper presents a stylistic analysis of two poems of well-known poets of the English literature, namely; E.E. Cummings and the Irish noble laureate Seamus Heaney. The researcher's attempt here is to approach Cummings’s poem “maggie and milly and molly and may” and Heaney’s “A Kite for Aibhín” from the stylistics’ point of view. The paper also analyzes the poems using the tools of linguistics with a view to make their meaning explicit.
It is worth noting that stylistics as a scientific discipline is really beneficial to those who are teaching and studyi
... Show MoreThis study compared the clinicopathological, immunohistochemical characteristics and Epstein-Barr virus (EBV) detection of Burkitt's lymphoma (BL) in the abdomen and jaw of Iraqi patients. A cohort/retrospective study was carried out between August and September 2024 using 25 tissue blocks (14 gnathic and 11 abdominal BL) from the Oral and Maxillofacial Laboratory, University of Baghdad, College of Dentistry, and the National Centre for Educational Laboratories. The sections were stained with haematoxylin and eosin (H&E), while CD10, CD20, Bcl-2, BCl-6, C-Myc and Ki-67 markers were used for diagnosis. The DNA detection of the EBV was performed by polymerase chain reaction (PCR). The tumours showed 22 classical and 3 atypical histologi
... Show MoreAmong many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreIn this work, the spectra of plasma glow produced by Nd:YAG laser operated at 1.064 μm on Al-Mg alloys with same molar ratio samples in air were analyzed by comparing the atomic lines of aluminum and magnesium with that of strong standard lines. The effect of laser energies on spectral lines, produced by laser ablation, were investigated using optical spectroscopy, the electron density was measured utilizing the Stark broadening of magnesium-aluminum lines and the electron temperature was calculated from the standard Boltzmann plot method. The results that show the electron temperature increases in magnesium and aluminum targets but decreases in magnesium: aluminum alloy target, also show the electron density increase all the aluminum,
... Show Moreأن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخ
... Show More