In this paper, effective slab width for the composite beams is investigated with special emphasis on the effect of web openings. A three dimensional finite element analysis, by using finite element code ANSYS, is employed to investigate shear lag phenomenon and the resulting effective slab width adopted in the classical T-beam approach. According to case studies and comparison with limitations and rules stipulated by different standards and codes of practice it is found that web openings presence and panel proportion are the most critical factors affecting effective slab width, whereas concrete slab thickness and steel beam depth are less significant. The presence of web opening reduces effective slab width by about 21%.
... Show MoreThis paper investigates the collocational use of irreversible food binomials in the lexicons of English (UK) and Arabic (Iraq), their word-order motivations, cultural background, and how they compare. Data consisted in sixteen pairs in English, versus fifteen in Arabic. Data analysis has shown their word order is largely motivated by logical sequencing of precedence; the semantically bigger or better item comes first and the phonologically longer word goes last. These apply in a cline of decreasing functionality: logical form first, semantic importance second, phonological form last. In competition, the member higher in this cline wins first membership. While the entries in each list clearly reflect culturally preferred food meals in the UK
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreIf we go beyond the technical aspects of the Web 2.0, and we focus specifically on its interactive characteristics, we may say it represents not only a fundamental shift in the structure of the press institutions and its practices but also a shift in the relationships that existed, previously, between the press and the audience. Web 2.0 has enabled the newspapers to renovate their representations and practices of the profession and opens to the new horizons either in terms of readership or advertising revenues. Parallel to that it also has empowered the user to transcend the passivity he has always been confined in and has become a more active participant in the creation and generation of media contents even though this practice is somew
... Show MoreWeb testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t
... Show MoreThis paper develops the work of Mary Florence et.al. on centralizer of semiprime semirings and presents reverse centralizer of semirings with several propositions and lemmas. Also introduces the notion of dependent element and free actions on semirings with some results of free action of centralizer and reverse centralizer on semiprime semirings and some another mappings.
In this paper, a harvested prey-predator model involving infectious disease in prey is considered. The existence, uniqueness and boundedness of the solution are discussed. The stability analysis of all possible equilibrium points are carried out. The persistence conditions of the system are established. The behavior of the system is simulated and bifurcation diagrams are obtained for different parameters. The results show that the existence of disease and harvesting can give rise to multiple attractors, including chaos, with variations in critical parameters.
This in order to test the effect of food on growth and fecundity, two kinds of food have been used the algae Scendesmus quadricaudae and fresh water shrimp powder. For two generations, growth and productivity have been followed up. The fresh water shrimp has been noticed as a food better than algae, because it caused recording, for the two generation higher length rate for the weeks of experiment. The individuals length rate at the end of the forth week reached 9.35 and 9.48 mm for the first generation and second generation respectively. The average length weekly increase rate for the first and second generations individuals feeding on dried shrimp was higher through the first and second week compared to what was recorded when feeding alga
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show More