This study focuses on studying the effect of reinforced steel in detail, and steel reinforcement (tensile ratio, compression ratio, size, and joint angle shape) on the strength of reinforced concrete (compressive strength) Fc' and searching for the most accurate details of concrete divisions, their behavior, and corner resistance of reinforced concrete joint. The comparison of this paper with previous studies, especially in the studied properties. The conclusions of the chapter are summarized that these effects had a clear effect and a specific effect on the behavior and resistance of the reinforced concrete corner joints under the negative moments and under their influence and the resulting stress conditions. The types of defects that can be strengthened and reduced in corner joints have also been studied in order to get rid of them as much as possible or reduce them to some extent. The details and fracturing conditions are roughly determined to be identical for all types of rebar details and basic requirements for the acceptable behavior and efficiency of reinforced concrete joints in structures. This may help in preparing for any collapses that may occur in the concrete structures due to natural disasters especially seismic, poor implementation, or other disasters resulting from other man-made disasters, as in wars. In natural disasters, as happens with earthquakes or malfunctions that may occur due to a specific malfunction, wrong designs, or old buildings, and the possibility of using those connections with them, and treating these connections and sections in reinforced or non-reinforced concrete structures. To keep people and buildings safe from sudden disasters and reduce those risks that may pose a threat to safe societies and the security of nations, as well as to intensify production quality control, defect-free concrete joints and parts to the extreme in production plants. As in the human spine, we find that cartilage helps maintain the stability of the vertebrae when bending or exposure to bruises, shocks, bruises, and vibrations when driving a car and walking in a hole in the road or bumps.
Microorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and Candida. C.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro
... Show MoreForty different samples (water and soil) were collected from different places in Iraq and Syria. Only (6) isolates showed the ability to grow and utilize agar as a sole source of carbon and energy. Morphological, cultural characterization and biochemical tests confirmed that These isolates belonging to genus Pseudomonas (HK1-HK6) .Plasmid profiles results showed that these isolates were harbored (2 -3) small Plasmids . HK1 isolate was selected because of its efficiency and ability to grow in high density on agar media for transformation and curing experiments, these were checked by transformation experiments after their expression in E. coli MM294. The genes responsible for agar utilization were located on thes
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreUndesirable behaviors among students are consider one of the danger problems threating societies and educational and scientific institutions of countries because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :
- Recognize undesirable behavior in students of University by the view of their instructors
- Measure the level of undesirable behavior in students of university by the view of their instructors
- Recognize more common undesirable behavior in students of University by the view o
The aesthetic dimension in popular subjects is one of the important topics in the history and culture of peoples, as it is the vessel from which their faith, traditions, original values, language, ideas, practices and way of life are derived, which expresses their culture and national identity, and it is the bridge of communication between generations throughout the ages.
It is one of the main pillars in the process of development and development, and popular subjects have special images related to real daily life, and they are the best source for man to narrate through him in his portrayal of daily life in general, and for the artist in particular, who is part of this daily life and its vocabulary, as he interacts with it so that
... Show MoreThe poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)
... Show MoreThe best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical res
... Show MoreAttention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreANN modeling is used here to predict missing monthly precipitation data in one station of the eight weather stations network in Sulaimani Governorate. Eight models were developed, one for each station as for prediction. The accuracy of prediction obtain is excellent with correlation coefficients between the predicted and the measured values of monthly precipitation ranged from (90% to 97.2%). The eight ANN models are found after many trials for each station and those with the highest correlation coefficient were selected. All the ANN models are found to have a hyperbolic tangent and identity activation functions for the hidden and output layers respectively, with learning rate of (0.4) and momentum term of (0.9), but with different data
... Show More