This paper aims to evaluate the reliability analysis for steel beam which represented by the probability of Failure and reliability index. Monte Carlo Simulation Method (MCSM) and First Order Reliability Method (FORM) will be used to achieve this issue. These methods need two samples for each behavior that want to study; the first sample for resistance (carrying capacity R), and second for load effect (Q) which are parameters for a limit state function. Monte Carlo method has been adopted to generate these samples dependent on the randomness and uncertainties in variables. The variables that consider are beam cross-section dimensions, material property, beam length, yield stress, and applied loads. Matlab software has been adopted to generate these pseudo-random variables dependent on its statistical characteristics such as coefficient of variance and probability density function that gathered from a review of literatures.
Corrosion of steel reinforcement is one of the biggest problems facing all countries in the world like bridges in the beach area and marine constructions which lead to study these problems and apply some economical solutions. According to the high cost of repair for these constructions, were studied the effect of using kind of chemical compounds sodium nitrite(NaNO2) and sodium silicate(Na2SiO3) as corrosion inhibitors admixture for steel bars that immersed partially in electrolyte solution (water + sodium chloride in 3% conc.) (Approximately similar to the concentration of salt in sea water). The two inhibitors above added each one to the electrolyte solution at concentrations (0.5%, 1% and 2%) for both
... Show MoreThis research investigates manganese (Mn) extraction from Electric Arc Furnace Steel Slag (EAFS) by using the Liquid-liquid extraction (LLE) method. The chemical analysis was done on the slag using X-ray fluorescence, X-ray diffraction, and atomic absorption spectroscopy. This work consisted of two parts: the first was an extensive study of the effect of variables that can affect the leaching process rate for Mn element from slag (reaction time, nitric acid concentration, solid to liquid ratio, and stirring speed), and the second part evaluates the extraction of Mn element from leached solution. The results showed the possibility of leaching 83.5 % of Mn element from the slag at a temperature of 25°C, nitric acid co
... Show MoreThe research aims to evaluate Islamic electronic libraries and their service for downloading research and illustrated books, explaining their origins, features and types. The research was limited to the libraries available on the Internet that provide the service for downloading research and illustrated books. The researcher relied on the survey approach to identify the libraries and a sample of them (20 libraries) was selected. For the purpose of evaluating it according to five criteria related to the preparation and publication of Islamic electronic libraries (the responsible party, the goals and objectives, the year, the services it provides, the sections and subject specializations of its contents) and five criteria related to the servi
... Show MoreHeavy oil is classified as unconventional oil resource because of its difficulty to recover in its natural state, difficulties in transport and difficulties in marketing it. Upgrading solution to the heavy oil has positive impact technically and economically specially when it will be a competitive with conventional oils from the marketing prospective. Developing Qaiyarah heavy oil field was neglected in the last five decades, the main reason was due to the low quality of the crude oil resulted in the high viscosity and density of the crude oil in the field which was and still a major challenge putting them on the major stream line of production in Iraq. The low quality of the crude properties led to lower oil prices in the global markets
... Show MoreThis work includes the synthesis of new ester compounds containing two 1,3,4-oxadiazole rings, 15a-c and 16a-c. This was done over seven steps, starting with p-acetamido-phenol 1 and 2-mercaptobenzoimidazole 2. The structure of the products was determined using FT-IR, 1H NMR, and mass spectroscopy. The evaluation of the antimicrobial activities of some prepared compounds was achieved against four types of bacteria (two types of gram-positive bacteria; Staphylococcus aureus and Bacillus subtilis, and two types of gram-negative bacteria, Pseudomonas aeruginosa and E. Coli), as well as against one types of fungus (C. albino). The results show moderate activit against the study bacteria, and the theoretical analysis of the toxi
... Show MoreThe general objective of the research is to better understand changes in land cover and their impact on climatic factors by measuring changes in land cover for the Baghdad city for the period 1999-2021 and evaluating changes in land cover and measuring changes in climatic factors (relative humidity and evaporation). This study from 1999 to 2021 and in two different seasons: the April of the growing season and August the dry season. When using the supervised classification method to determine the differences, the results showed remarkable changes, the study showed the spatial variations in LC from 1999 to 2021 as follows: increase in the vegetation and water bodies during April and decrease this in August while the soil and built up decreas
... Show MoreThe objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association
... Show MoreThe present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.
The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More