This paper investigates the experimental response of composite reinforced concrete with GFRP and steel I-sections under limited cycles of repeated load. The practical work included testing four beams. A reference beam, two composite beams with pultruded GFRP I-sections, and a composite beam with a steel I-beam were subjected to repeated loading. The repeated loading test started by loading gradually up to a maximum of 75% of the ultimate static failure load for five loading and unloading cycles. After that, the specimens were reloaded gradually until failure. All test specimens were tested under a three-point load. Experimental results showed that the ductility index increased for the composite beams relative to the reference specimen by 156.2% for a composite beam with GFRP with shear connectors, 148.6% for composite beams with GFRP without connectors, and 96% for the composite beam with a steel I-section.
Background: Maxillary canines are important aesthetically and functionally, but impacted canines are more difficult and time consuming to treat, the aim of this study is to investigate with multi-detector computed tomography the correlation between the bone density and the upper canine impaction. Material and method: A sample of Unilaterally impacted maxillary canines from 24 patients (19 female, 5 male) who were referred to accurately localize the impacted canines at al- Karkh general hospital were evaluated by a volumetric 3-d images by the multi-detector computed tomography to accurately measure the bone density of the maxillary cortical palate of the maxillary impacted canine side and compare it with the other side of the normally erupt
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show Moreالخلاصة
یعد والت وتمن شاعرا استثنائیا سواء أكان ذلك في المكانة التي یحتلھا في الأدب الأمریكي او في نمط
اع t ذا الإیق t لة ھ t ة وص t وافقي خاص t اع الت t تخدامھ الإیق t ي اس t دي ف t ر تقلی t عرا غی t الشعر الذي یكتبھ. لقد كتب وتمن ش
ل t ة للتوص t ف الطبیع t وافقي لوص t اع ا لت t ن الإیق t تخدم وتم t ر ، اس t بوحدة الكون الذي عبر عنھ في شعره.وبمعنى آخ
نص t ل ال t جام داخ t رابط وانس t یج مت t ھ نس t ق انظم t دف لخل t ھ تھ t اھره أدبی t واف
This study aimed to investigate the ability of clove and cinnamon extracts to make pathogenic multidrug-resistant (MDR) Klebsiella pneumoniae more sensitive to the host’s immune system and thereby interrupt the bacterial infection process in the rat model. Therefore, 60 Wistar male rats were used in this study. The phytochemical constituents of the plant extract were analysed using the gas chromatography-mass spectrometry (GC-MS) technique. Then, the capability of the plant extracts, as prophylactic and treatment, against K. pneumoniae in rats was studied by estimating the complete blood counts (CBCs) and the serum concentrations of interleukin-4 (IL-4) and interferon-gamma (IFN-γ) before and after the treatment. The results showed that
... Show MoreObjective: The present work was undertaken to investigate the impact of sub inhibitory concentration of gentamicin on hla gene expression in methicillin resistant Staphylococcus aureus isolates. Methods: The bacterial isolates used in this study represent 33 MRSA strains, previously isolated form patients visiting several hospitals in Baghdad. Gentamicin, vancomycin, and oxacillin MIC were determined using broth dilution method. Microtiter plate method was adopted to investigate the biofilm forming capacity. Alpha hemolysin was detected by culturing MRSA isolates on rabbit blood agar. Furthermore, hla gene was detected in MRSA isolates using conventional PCR technique; while, qRT-PCR method was performed to assay the hla expression in plank
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe present study aims at examining quantitatively the morphometric characteristics of Iziana Valley basin that is located in the northern part of Iraq; particularly in south of Erbil Governorate. This basin is considered one of the small sub-basins where its valleys run on formations of the Triple and Quadrant Ages, which are represented by the Bay Hassan formations, and the sediments and mixed sediments of the cliffs, respectively. The area of the Iziana basin amounts to (36.39 km2) whereas the percentage of its rotation reaches (0.17); a low percentage, which indicates that the basin diverges from the circular to the rectangular shape. The value of the elongation ratio of the basin reaches (0.38) while the terrain rat
... Show MoreAbstract:-
The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.
In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.
I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an
... Show More