China is moving towards building the largest economic power in the world, so what does this mean economically and politically for Europe, America, the Middle East and the Arab world? This project is called the expansionist Chinese Marshall Plan which is a revival of the old Silk Road in a new way. It represents the aspirations of the Chinese people and their president, Xi Jinping, to build a transport route from Asia to Europe and a railway plan to transport goods. The purpose of this is to develop the economic growth model, expand into new markets, promote the Chinese currency, and expand economic and political influence in the areas covered by the Chinese initiative. Equal opportunities in distributing investments to these countries, and the emergence of the importance of the Chinese project is due to the world’s need for stability, security, and peaceful coexistence away from the economic crises experienced by Europe or the armed conflicts experienced by the Arab countries. It is a huge economic and global project that can achieve profits for the participating countries.
Test results of eight reinforced concrete one way slab with lacing reinforcement are reported. The tests were designed to study the effect of the lacing reinforcement on the flexural behavior of one way slabs. The test parameters were the lacing steel ratio, flexural steel ratio and span to the effective depth ratio. One specimen had no lacing reinforcement and the remaining seven had various percentages of lacing and flexural steel ratios. All specimens were cast with normal density concrete of approximately 30 MPa compressive strength. The specimens were tested under two equal line loads applied statically at a thirds part (four point bending test) up to failure. Three percentage of lacing and flexural steel ratios wer
... Show MoreIn this study the simple pullout concrete cylinder specimen reinforced by a single steel bar was analyzed for bond-slip behavior. Three-dimension nonlinear finite element model using ANSYS program was employed to study the behavior of bond between concrete and plain steel reinforcement. The ANSYS model includes eight-noded isoperimetric brick element (SOLID65) to model the concrete cylinder while the steel reinforcing bar was modeled as a truss member (LINK8). Interface element (CONTAC52) was used in this analysis to model the bond between concrete and steel bar. Material nonlinearity due to cracking and/or crushing of concrete, and yielding of the steel reinforcing bar were taken into consideration during the analysis. The accuracy of t
... Show MoreThis study focused on benthic algae (epipelic and attached algae on concrete lining stream) in Bani-Hassan stream in Holly Karbala, Iraq. The qualitative and quantitative studies of benthic algae were done by collecting 240 samples from five sites in the study area for the period from December 2012 to November 2013. Also, the environmental variables of the stream were examined in term of temporary and spatial. The results showed that the stream was alkaline, hard, oligohaline and a well aerated. The total nitrogen to the total phosphorus (TN: TP) ratio indicates nitrogen limitation. 129 species of benthic algae belonging to 57 genera were identified. Bacillariophyceae (diatoms) was the predominant taxon (95 species) followed by Chlorophyce
... Show MoreIn this study, aluminum nanoparticles (Al NPs) were prepared using explosive strips method in double-distilled deionized water (DDDW), where the effect of five different currents (25, 50, 75, 100 and 125 A) on particle size and distribution was studied. Also, the explosive strips method was used to decorate zinc oxide particles with Al particles, where Al particles were prepared in suspended from zinc oxide with DDDW. Transmission electron microscopy (TEM), UV-visible absorption spectroscopy, and x-ray diffraction are used to characterize the nanoparticles. XRD pattern were examined for three samples of aluminum particles and DDDW prepared with three current values (25, 75 and 125 A) and three samples prepared with the same currents for zin
... Show MoreDylan Thomas (1914-1953) is a modern poet belongs to the apocalyptic movement of the 1940's.This movement is influenced by the doctrines and techniques of surrealism. Poetry for him should not be primarily concerned with man in society, but with the celebration of spiritual truth. It should bring to light the hidden causes, hence his personal interest is to strip darkness and explore the inward motives. To do this he uses a cluster of images: a constant building up and breaking down of images. His poetry depends on the romantic spontaneity, suggestiveness of the Symbolists and the the surrealists' mysterious liberation of the unconsciousness and the emotional involvement in the dynamics of life. In "Light Breaks
... Show MoreThe steady state laminar mixed convection and radiation through inclined rectangular duct with an interior circular tube is investigated numerically for a thermally and hydrodynamicaly fully developed flow. The two heat transfer mechanisms of convection and radiation are treated independently and simultaneously. The governing equations which used are continuity, momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C) methods. The finite difference approach with the Line Successive Over-Relaxation (LSOR) method is used to obtain all the computational results. The (B.F.C) method is used to generate the grid of the problem. A computer program (Fortran
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More