This paper aimed to investigate the effect of the height-to-length ratio of unreinforced masonry (URM) walls when loaded by a vertical load. The finite element (FE) method was implemented for modeling and analysis of URM wall. In this paper, ABAQUS, FE software with implicit solver was used to model and analysis URM walls subjected to a vertical load. In order to ensure the validity of Detailed Micro Model (DMM) in predicting the behavior of URM walls under vertical load, the results of the proposed model are compared with experimental results. Load-displacement relationship of the proposed numerical model is found of a good agreement with that of the published experimental results. Evidence shows that load-displacement curve obtained from the FE model has almost the same trend of experimental one. A case study of URM walls was conducted to investigate the influence of the wall aspect ratio on its capacity and stress distribution due to a vertical load using DMM approach. In this paper, curves obtained that show a relationship between height level and generated compressive stress of walls with different aspects ratios and the strength of each URM wall and the DMM technique that has been utilized for numerical simulation.
Investment in Human is one of the best and most important investments as it is renewed and developed resource over time in comparison with depleted material resources. Human resources is considered the part of the population that could be employed economically to contribute in increasing production energies as it is the support pillar of the society and have great energies that construct the society and raise of nations as well as he is distinguished with characteristics of ambitions to freedom.
Iraq is one of the countries that has large number of population in age of work and production and reduce in age dependent classes (children and old people).This dynamic in population led to step
... Show MoreThe current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have
This study deals with an important area in the field of linguistics, namely person deixis.
The study aims at: (1) Describing the notion of deixis, its importance, and its place in the field
of linguistics, (2) Presenting a detailed illustration of person deixis, and (3) Conducting an
analysis of person deixis in one of Synge‟s plays Riders to The Sea according to Levinson‟s
model. The most important aim of these three is the third one (the analysis). To achieve this
aim, the researcher depends on Levinson‟s (1983) descriptive approach. According to the
descriptive approach of deixis, the category of person deixis can be defined as the encoding of
the participant roles in the speech situation. This encoding is r
The Middle Cenomanian-Early Turonian Mishrif Formation includes important carbonate reservoirs in Iraq and some other surrounding countries due to their high reservoir quality and wide geological extension. The 2D models of this study for facies, effective porosity and water saturation indicate the vertical and lateral heterogeneity of the Mishrif Formation reservoir properties in the Majnoon oil field. Construction of 2D reservoir model of the Mishrif Formation to explain the distribution of facies and petrophysical properties (effective porosity and water saturation) by using RockWorks software. The increase of effective porosity is attributed to the presence of shoal facies.The high water saturation is attributed to the existence of rest
... Show Moresignificant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.
Many Iraqi students are reluctant to actively participate in the English
language classroom. This reluctance is attributed to a number of factors, above which
is students' lack of thinking skills necessary to express their points of view. This
eventually results in passive learning, a real problem in English language learning in
Iraq.
A need for educational reforms and innovations seems essential. These involve
developing relevant teaching materials, adopting learner-centered approach,
promoting learner autonomy, and enhancing critical thinking.
This study is hoped to assist teachers of English to initiate change and foster
the expansion of thinking, and adopt various new strategies to increase classroom
par
In this research , we tried to identify the meaning empowerment in the development literatures , and inquire the most enabling prominent actions to promote women , as we considered the most important international conferences that take up the subject of women's empowerment .
In the context of research on the subject of empowering women to occupy leadership positions , we tried to diagnose the target of the empowerment , and we clarify the correlation between human development and empowerment of women , also the research touched on the decision (1325) issued by the United Nations , which includes provisions regarding the importance of women participation at all levels in the process of decision-making .
We realized that there are so
In this research the subject of human ability to change, as it is proven in the Koran , which is proof of the argument against the ability of human change , whether the change in the positive or negative direction .
Here the limits of the research are limited to a study of analysis of human ability to change and this establishes the important of knowing that man has the ability while in the wrong way to change the path to the right path which Gifts and guidance .
The search required three demands and conclusion
- The first required :- is to try the idolaters to take out believers by right .
- The second required :- is to change what is inside the soul as a reason to enter blessings on man .
- The third required :- is good
Many Iraqi students are reluctant to actively participate in the English
language classroom. This reluctance is attributed to a number of factors, above which
is students' lack of thinking skills necessary to express their points of view. This
eventually results in passive learning, a real problem in English language learning in
Iraq.
A need for educational reforms and innovations seems essential. These involve
developing relevant teaching materials, adopting learner-centered approach,
promoting learner autonomy, and enhancing critical thinking.
This study is hoped to assist teachers of English to initiate change and foster
the expansion of thinking, and adopt various new strategies to increase classroom
par
In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show More