This research is devoted to investigating the thermal buckling analysis behaviour of laminated composite plates subjected to uniform and non-uniform temperature fields by applying an analytical model based on a refined plate theory (RPT) with five unknown independent variables. The theory accounts for the parabolic distribution of the transverse shear strains through the plate thickness and satisfies the zero-traction boundary condition on the surface without using shear correction factors; hence a shear correction factor is not required. The governing differential equations and associated boundary conditions are derived by using the virtual work principle and solved via Navier-type analytical procedure to obtain critical buckling temperature. Results are presented for: uniform and linear cross-ply lamination with symmetry and antisymmetric stacking, simply supported boundary condition, different aspect ratio (a/b), various orthogonality ratio (E1/E2), varying ratios of coefficient of uniform and linear thermal expansion (α2⁄α1), uniform and linearly varying temperature thickness ratio (a/h) and numbers of layers on thermal buckling of the laminated plate. It can be concluded that this theory gives good results compared to other theories.
Targeted research to study variations formalism in the paintings of the scratch -linear , and through surveys carried out by the researcher , found and to his knowledge that the study did not address the researchers before, this researcher found rationale in the study of plates scratch and identify variations of design in it. , Which included the first chapter of the research problem in question the following: What morphological variations in the paintings of the scratch -linear ?In order to reach solutions to this problem and to achieve results so research aims to identify the characteristics of the scratch for paintings , and design fundamentals and relationships , which are identified by the researcher Balentajat completed in all of I
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThis research was from an introduction, three topics and a conclusion, as follows:
The first topic: the concept of Islamic banks and their emergence and development, which includes three demands are:
The first requirement: the concept of Islamic banks and types, and there are two requirements:
* Definition of Islamic banks language and idiom.
* Types of Islamic banks.
The second requirement: the emergence and development of Islamic banks.
Third requirement: the importance of Islamic banks and their objectives.
We learned about the concept of banks and their origins and how they developed and what are the most important types of Islamic banks
The second topic: Formulas and sources of financing in Islamic banks and
Walter Lippmann, speaking about man, says : ” Gradually he makes for himself a trustworthy picture inside his head of the world beyond his reach. “. This means that the picture, whether it was good or bad, it doesn’t happen for nothing, but rather for intentional purposes. Some orientalists make their judgements even before getting to the place concerned with the study.
The mental image is one of the most misused terminology, although the world today has become the world of image, it witnessed the disappearance of the theories that used to consider the media as a reflective mirror for society, also it was confirmed that the media creates what varies from reality and sometimes completely different from reality. The image of
... Show MoreImproving in assembling technology has provided machines of higher evaluation with better resistances and managed behavior. This machinery led to remarkably higher dynamic forces and therefore higher stresses. In this paper, a dynamic investigation of rectangular machine diesel and gas engines foundation at the top surface of one-layer dry sand with various states (i.e., loose, medium and dense) was carried out. The dynamic investigation is performed numerically by utilizing limited component programming, PLAXIS 3D. The soil is accepted as flexible totally plastic material submits to Mohr-Coulomb yield basis. A harmonic load is applied at the foundation with amplitude of 10 kPa at a frequency of (10, 15 and 20) HZ and se
... Show MoreVarious types of heterogeneous five membered rings were prepared from the reaction of the compound chloro Di Fluro acetic acid with Schiff bases (which was prepared using different Aldehydes, Ketones, and amines [H10-H1] and five membered rings were prepared (derivatives of Oxazolidine-5-one, and the presence of Tetrahydrofuran (THF) [H20-H11]. Melting points of the compounds were measured. The prepared compounds were diagnosed spectrally by using UV-Visible and Infrared spectroscopy, and (1H-NMR) Spectrum for some compounds. The results confirmed the validity of the proposed chemical compositions