This paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the deep beam is governed by the size and location of web openings. The experimental results indicated that the reduction of the shear capacity may reach (66%). ABAQUS finite element software program was used for simulation and analysis. Numerical analyses provided un-conservative estimates for deep beam load carrying capacity in the range between (5-21%). However, the maximum scatter of the finite element method predictions for first diagonal and first flexural cracking loads was not exceeding (17%). Also, at service load the numerical of midspan deflection was greater than the experimental values by (9-18%).
The research aims to identify the concept of green taxes and their role in reducing environmental pollution through the poll of Abnh of taxpayers and employees of the General Authority for taxes totaling 200 individual .autam adoption of the resolution as a tool head for the collection of data and information from the sample and analyzed their responses using a statistical program (spss - 10), and calculating the percentages and the arithmetic mean, standard deviation and research found to a number of conclusions, notably the lack of legislation with the challenges and the difficulty of the existence of a measure or a standard lack of planning for the application of environmental taxes that the state taxation application between the Gene
... Show MoreThis study was carried out to determine the heavy metal accumulation of Juncus rigidus Desfontaines, 1798 from three different regions of the Basrah Province in Southern of Iraq. Specifically, the concentrations of lead, nickel, and cadmium were determined in the roots, culms and leaves of the plant. The results indicated that the highest accumulation of the heavy metal was recorded in lead (Pb) 12.50± 3.58 mg kg-1and then in nickel (< 0.30). The lowest value was recorded for cadmium (< 0.05). As well, lead concentrations in J. rigidus varied in different locations and parts of the plant from undetectable in control to 12.66, 19.33, and 9.80 mg kg-1 in leaves, culm, and roots respective
... Show MoreAbstract
The study aims to identify the levels of core competencies dimensions and types of organizational flexibility in the investigated organization, as well as to determine the nature of the relationship and the impact of core competencies dimensions with the process of organizational flexibility. Thus, a number of research questions were presented to express the research problem as follows:
- What is the level of the investigated individuals' awareness to core competencies and organizational flexibility across their dimensions and types in the investigated organization?
- To what extent are core competencies and organizational flexibility available in the Organiz
Objectives: The study aims to identify the effects of an educational program on patients’ knowledge about vascular access care and to find out the relationship between patients knowledge scores and their selected demographic variable. &
... Show MoreThis research aims at studying and analyzing the creative research thinking of the educational staffs in private universities and colleges, and also the role of incentives, in its materialistic and moral sides in the development of such thinking and the pack of restraints which cause decline in interest level of the scientificresearch, and its weak role in the development of universities in Iraq, despite the interest of the Ministry of Higher Education and Scientific Research in Iraq in scientific research as part ofits academic and humanitarian targets.Based on study and analysis, and the using if some of statistical methods such as the Alpha Chronobaghcoefficient and the (T. Test)(F. Test),the research reached a number of conclusions.
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreImage content verification is to confirm the validity of the images, i.e. . To test if the image has experienced any alteration since it was made. Computerized watermarking has turned into a promising procedure for image content verification in light of its exceptional execution and capacity of altering identification.
In this study, a new scheme for image verification reliant on two dimensional chaotic maps and Discrete Wavelet Transform (DWT) is introduced. Arnold transforms is first applied to Host image (H) for scrambling as a pretreatment stage, then the scrambled host image is partitioned into sub-blocks of size 2×2 in which a 2D DWT is utilized on ea
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More