In this research, the mechanism of cracks propagation for epoxy/ chopped carbon fibers composites have been investigated .Carbon fibers (5%, 10%, 15%, and 20%) by weight were used to reinforce epoxy resin. Bending test was carried out to evaluate the flexural strength in order to explain the mechanism of cracks propagation. It was found that, the flexural strength will increase with increasing the percentage weight for carbon fibers. At low stresses, the cracks will state at the lower surface for the specimen. Increasing the stresses will accelerate the speed of cracks until fracture accorded .The path of cracks is changed according to the distributions of carbon fibers
Abstract
The net profit reported in the annual financial statements of the companies listed in the financial markets, is considered one of the Sources of information relied upon by users of accounting information in making their investment decisions. At the same time be relied upon in calculating the bonus (Incentives) granted to management, therefore the management of companies to manipulate those numbers in order to increase those bonuses associated to earnings, This practices are called earnings management practices. the manipulation in the figures of earnings by management will mislead the users of financial statements who depend on reported earnings in their deci
... Show Morethis research seeks to shed light on the study of the impact of Putinism on the Russian-Ukrainian war that broke out in early 2022, by studying the contents of the speeches of Russian President Vladimir Putin before the start of the war. This research uses the structural approach in analyzing the components of the Russian political regime. The research tools used in this research include case studies, content analysis of Russian speeches, and personal meetings of researchers and specialists in Russian affairs. It sums up a number of important conclusions, most notably are : 1) Putinism is a totalitarian regime that includes the political doctrine during the era of Russian President Vladimir Putin. 2) Duginism represents the totality of t
... Show MoreIncreasing need for day after day to find ways and innovative means of
helping to educate and give children the skills of different kind, has found a
researcher on the subject of hats, six room to give children language skills
through the experience of field reconnaissance conducted on the three
children found that language skills improved, he decided to make these study.
Objectives of the study:
Understand the differences between the experimental group first (the way the
debate) and second (six caps) depending on the test post administration.
to identify the language skills of the second group according to the pre and
post test
Differences between males and females in the second group (Six Hats)
Search T
Live the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.
... Show MoreThe behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u
... Show MoreIdentify the effect of an educational design according to the repulsive (allosteric) learning model on the achievement of chemistry and lateral thinking. The sample consisted of (59) students from third-grade intermediate students. They were randomly distributed into two groups (experimental and control), and the equivalence was done in (chronological age, previous achievement in chemistry, intelligence, lateral thinking). The (30) students from experimental group were taught according to the instructional design, other 29 students from the (control) group were taught according to the usual method. Two tests done, one of them is an achievement test consisted of (30) items of the type of multiple choice, the other was a lateral think
... Show MoreIn this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables