Preferred Language
Articles
/
ehZYCocBVTCNdQwCgjFV
Effect of Size and Location of Square Web Openings on the Entire Behavior of Reinforced Concrete Deep Beams
...Show More Authors

This paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the deep beam is governed by the size and location of web openings. The experimental results indicated that the reduction of the shear capacity may reach (66%). ABAQUS finite element software program was used for simulation and analysis. Numerical analyses provided un-conservative estimates for deep beam load carrying capacity in the range between (5-21%). However, the maximum scatter of the finite element method predictions for first diagonal and first flexural cracking loads was not exceeding (17%). Also, at service load the numerical of midspan deflection was greater than the experimental values by (9-18%).

Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
sEffect of Sb doping on CuAlSe2 thin films and their behavior on the preparation CuAlSe2/Si heterojunction solar cells
...Show More Authors

Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Tue Sep 12 2017
Journal Name
Nucl Sci Tech
Investigating the influence of gamma ray energies and steel fiber on attenuation properties of reactive powder concrete
...Show More Authors

Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Sep 12 2017
Journal Name
Nuclear Science And Techniques
Investigating the influence of gamma ray energies and steel fiber on attenuation properties of reactive powder concrete
...Show More Authors

View Publication
Crossref (12)
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The phenomenon of negative behavior has studied as a social and psychological phenomenon that effect on the performance and life of workers inside and outside the organization. The adoption of this phenomenon is studied in terms of the role of the interna
...Show More Authors

The phenomenon of negative behavior has studied as a social and psychological phenomenon that effect on the performance and life of workers inside and outside the organization. The adoption of this phenomenon is studied in terms of the role of the internal environment of the organization in addressing this behavior, being the variables belong to the field of organizational behavior to see the results of those variables on the Iraqi organizations, since the specificities of it differ from the rest of the Arab and foreign environments. Therefore, this study focused on testing the relationship of the internal environment of the organization and its role in addressing the negative behavior of the workers.

thi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of the law of amending the unified pension law No. (26) of 2019 on the size of tax revenues An applied research on a sample of Iraqi public universities: أثر تطبيق قانون التقاعد الموحد رقم (26) لسنة 2019 على حجم الايرادات الضريبية
...Show More Authors

The contribution rate of tax revenues in the federal budget is very small compared to the rate of contribution of oil revenues and this leads to negative repercussions on the Iraqi economy and the budget becomes a prisoner of high and low oil prices, and this is a problem that needs to be studied to know the extent of the impact of economic and political decisions on the size of tax revenue and The research goal is determined in studying the effect of amending the Unified Law No (26) of 2019 on the size of annual tax revenues .                                   &

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 02 2018
Journal Name
International Journal Of Science And Research (ijsr)
The Compressibility of Clayey Soils Reinforced with Fiberglass
...Show More Authors

During the prior three decades numerous research works presented to investigate the behavior of reinforced soil. A, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Influence of Additives on Permanent Deformation and Resilient Modulus of Recycled Asphalt Concrete
...Show More Authors

Tests were performed on asphalt concrete specimens with (101.6 mm in diameter and 101.6 mm in height), and the results were implemented for calculating permanent deformation and resilient modulus under repeated compressive stress with different levels of stresses (0.068, 0.138 and 0.206) MPa at 40 ºC. Two types of additives namely (carbon black-asphalt) and (SBR-asphalt) were tried as rejuvenators with three percentages of (0.5, 1 and 1.5) % by weight of asphalt cement along with two ratios of AC (1 and 2) % have been implemented as rejuvenator and blended with the reclaimed asphalt concrete. Aged materials were obtained from the site. 100% Reclaimed Asphalt Pavement material from the reclaimed mixture is implemented. A

... Show More
View Publication Preview PDF
Crossref