Transient displacement of laminated plates under combined load based on Mantari' s displacement field are investigated. The solution is implemented under transient mechanical load (sinusoidal, step and triangular sinusoidal distributed pressures pulse) and thermal buckling for plates with different layer orientation and thickness ratio. Equations of motion based on higher-order theory are derived through Hamilton' s principle, and solved using Naviertype solution for simply supported laminated plates. The results are presented for many effective parameters such as the number of laminate and orientation on the dynamic response of plates. Results show the validity of this displacement field in studying response of laminated thick and thin plates under varied transient loading and design parameters.
The purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, preju
... Show MoreFor many years controlled shot peening was considered as a surface treatment. It is now clear that the performance of control shot peening in terms of fatigue depends on the balance between its beneficial (compressive residual stress and work hardening) and beneficial effects (surface hardening).
The overall aim of this paper is to study the effects of aggressive shot peening on fatigue life of 7075 – T6 aluminum alloy. The fatigue life reduction factor (LRF) due to the aggressive shot peening was established and empirical relations were proposed to describe the behavior of LRF, roughness and fatigue life. The benefits of shot peering in terms of fatigue life are dependent on the shot peening time (SPT).
... Show MoreBackground: Rehabilitation of the carious tooth to establish tooth structure integrity required cavity design that show a benign stress distribution. The aim of this study was to investigate the influence of the cavity position on the stress values in the reamining tooth structure restored with amalgam or resin composite. Materials and methods: Seven 2-D models of maxillary first premolar include class I cavity design was prepared, one sound tooth (A) 3 composite (B1, B2, and B3) and 3 amalgam (C1, C2, and C3). In design (BI and C1) the cavity position is in the mid distance between bacc-lingual cusp tip, design (B2 and C2) and (B3 and C3) shifted toward the buccal cusp and the lingual cusp for 0.5 mm respectively. One hundred N vertical
... Show MoreThe article provides a comparative analysis of comparisons in Russian and Arabic, aimed at identifying their structural, typological, and functional-pragmatic features. The study is based on a systematic approach to the analysis of linguistic means of expressing comparisons in two differ- ent linguistic cultures. The article analyzes the main structural components of comparisons, their classification, and their cognitive and aesthetic functions. The results of the study demonstrate the deep cultural conditioning of comparative constructions and their important role in representing the specific features of the respective linguistic cultures.
This research presents a numerical study to simulate the heat transfer by forced convection as a result of fluid flow inside channel’s with one-sided semicircular sections and fully filled with porous media. The study assumes that the fluid were Laminar , Steady , Incompressible and inlet Temperature was less than Isotherm temperature of a Semicircular sections .Finite difference techniques were used to present the governing equations (Momentum, Energy and Continuity). Elliptical Grid is Generated using Poisson’s equations . The Algebraic equations were solved numerically by using (LSOR (.This research studied the effect of changing the channel shapes on fluid flow and heat transfer in two cases ,the first: cha
... Show MorePVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More