This paper studied the behaviour of reinforced reactive powder concrete (RPC) two-way slabs under static load. The experimental program included testing three simply supported slabs of 1000 mm length, 1000 mm width, and 70 mm thickness. Tested specimens were of identical properties except their steel fibers volume ratio (0.5 %, 1 %, and 1.5 %). Static test results revealed that, increasing steel fibers volume ratio from 0.5% to 1% and from 1% to 1.5%, led to an increase in: first crack load by (32.2 % and 52.3 %), ultimate load by (36.1 % and 17.0 %), ultimate deflection by (33.6 % and 3.4 %), absorbed energy by (128 % and 20.2 %), and the ultimate strain by (1.1 % and 6.73 %). The stiffness and ductility of the specimens also increased. A numerical analysis was performed using ANSYS 14.5 software. The FE analysis overestimated the ultimate load capacity of all specimens by (6–28) %, and underestimated the ultimate deflection by (22-44) %. The deflected shape and crack patterns of the FE models were similar to that of the corresponding experimental specimens. It was found out that the optimum values of steel fibers volume fraction are 1.5 % and 1.6%.
This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe research aims to determine the role of functional alienation and its impact on Job Satisfaction in General Motors Company, that were selected to apply the field side being an important company in Iraq, the problem was research with difficulty in employees adapt and their sense of alienation in their work which is reflected negatively on the level of satisfaction with work in company searched. A questionnaire was adopted as the main tool for data collection research which included (31) items distributed on (50) employees in the company selected, on a randomly chosen and based on the statistical program ready by (SPSS). Sample of this study was the most important findings of the research are the weak management of the company i
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreNew data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175
Global warming has had considerable effects on vital ecosystems, which has also been caused by increased temperatures and CO2 that follow changes in different abiotic factors, which poses threats to mangrove forests environment. This research was conducted to examine the physiological and morphological characteristics of the Rhizophora apiculata mangrove regarding higher air temperature for the variety of tree species that respond to climate change. Seedlings were cultivated for three months in regulated growth chambers with three varying temperatures of 38°C, 21°C under CO2 at 450 ppm, and ambient CO2 concentration i.e., 450 ± 20 ppm under average temperature at 28°C as the control condition
... Show MoreRecently, there has been a notable surge in interest surrounding entrepreneurial orientation and strategic entrepreneurship. These concepts are particularly relevant due to their modern characteristics that aid in adapting to the environment. They also play a crucial role in improving production, service, and technological processes to sustain value, minimize competition, and drive ongoing enhancements, ultimately leading to a position of leadership within public companies. Therefore, the primary focus of this research was to examine the influence of entrepreneurial orientation on achieving strategic entrepreneurship. This influence is further mediated by the presence Iraqi Ministry of Agric
... Show MoreResearch Summary The aim of the search for knowledge of the effect generative learning strategy in: 1 - Achievement of the second grade. 2 - Systemic thinking for the second grade students when studying the biology. The study sample increased (60) students distributed into two equal experimental and control groups. Prepare the test of 40 pieces of multiple choice type and prepare a test for systematic thinking according to three skills 1. Understand the relationships between the parts of the systemic form and complement the sentences given 2 - complement the relationships between parts of the systemic form 3. Building the systemic form. It was a search result 1- There is a difference of statistical significance (at level 0.05) between th
... Show More