An experimental program was conducted to determine the residual of composite Steel Beams-Reinforced Concrete (SB-RC) deck floors fabricated from a rolled steel beam topped with a reinforced concrete slab, exposed to high temperatures (fire flame) of 300, 500, and 700ºC for 1 hour, and then allowed to cool down by leaving them in the lab condition to return to the ambient temperature. The burning results showed that, by exposing them to a fire flame of up to 300ºC, no serious permanent deflection occurred. It was also noticed that the specimen recovered 93% of 19.2 mm of the deflection caused by burning. The recovered deflection of burned composite SB-RC deck floor at 500ºC was 40% of 77.9 mm of the deflection caused by burning with a residual deflection of 46.4 mm. The greatest deterioration occurred when exposed to 700ºC, at this temperature, a higher unrecoverable permanent deflection was recorded (160.3 mm) of the maximum measured burning deflection (173.8mm), indicating that the percent recovered deflection was 8%. Then, all composite SB-RC deck floors were loaded until failure to determine the percent decrease in their ultimate capacity. The results were compared with the behavior of composite SB-RC deck floor without burning (reference specimen).
This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreThe high and low water levels in Tigris River threaten the banks of the river. The study area is located on the main stream of Tigris River at Nu’maniyah City and the length of the considered reach is 5.4 km, especially the region from 400 m upstream Nu’maniyah Bridge and downstream of the bridge up to 1250 mwhich increased the risk ofthe problemthat itheading towardsthe streetand causingdanger tonearbyareas.
The aim of this research is to identify the reason of slope collapse and find proper treatments for erosion problem in the river banks with the least cost. The modeling approach consisted of several steps, the first of which is by using “mini” JET (Jet Erosion Test) d
... Show MoreThis research aims to provide insight into the Spatial Autoregressive Quantile Regression model (SARQR), which is more general than the Spatial Autoregressive model (SAR) and Quantile Regression model (QR) by integrating aspects of both. Since Bayesian approaches may produce reliable estimates of parameter and overcome the problems that standard estimating techniques, hence, in this model (SARQR), they were used to estimate the parameters. Bayesian inference was carried out using Markov Chain Monte Carlo (MCMC) techniques. Several criteria were used in comparison, such as root mean squared error (RMSE), mean absolute percentage error (MAPE), and coefficient of determination (R^2). The application was devoted on dataset of poverty rates acro
... Show MoreThe consumption of dried bananas has increased because they contain essential nutrients. In order to preserve bananas for a longer period, a drying process is carried out, which makes them a light snack that does not spoil quickly. On the other hand, machine learning algorithms can be used to predict the sweetness of dried bananas. The article aimed to study the effect of different drying times (6, 8, and 10 hours) using an air dryer on some physical and chemical characteristics of bananas, including CIE-L*a*b, water content, carbohydrates, and sweetness. Also predicting the sweetness of dried bananas based on the CIE-L*a*b ratios using machine learn- ing algorithms RF, SVM, LDA, KNN, and CART. The results showed that increasing the drying
... Show MoreThis paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D
... Show More
Given the importance that the Iraqi banking system in general and Islamic banks in particular, there must be effective supervisory oversight of these banks, as supervisory oversight has an essential and effective role in the development and evaluation of the performance of banks, through the application of legal controls and rules. Banking aimed at making sure that its financial centers are safe, protecting depositors' funds, and achieving both monetary and economic stability. This research studied and evaluates the mechanisms and tools used by the Central Bank of Iraq in the supervision and supervision of these banks. Therefore, the research aimed to measure the type and direction of the relationship between the requirements of supervis
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More11-22 Description An apology may be defined as “the act of declaring one’s regret, remorse or sorrow for having insulted, failed, injured, harmed or wronged another (Internet Encyclopedia of Philosophy IEP). A definition quite interested in the function suggests that “an apology is a speech act addressed to B’s face–needs and intended to remedy an offence for which A. takes responsibility.”(Holmes, 1990: 159). Apologies are also" speech acts" that are hard to identify, define or categorize, a difficulty that arises directly out of the functions they perform (Lakoff, 2001: 201) and the forms they take. In function, they range from selfabasement for wrongdoing to the formal display of appropriate feeling. In form, they range from
... Show More