The primary goal of in-situ load testing is to evaluate the safety and performance of a structural system under particular loading conditions. Advancements in building techniques, analytical tools, and monitoring instruments are prompting the evaluation of the appropriate loading value, loading process, and examination criteria. The procedure for testing reinforced concrete (RC) structures on-site, as outlined in the ACI Building Code, involves conducting a 24-h load test and applying specific evaluation criteria. This article detailed a retrofitting project for an RC slab-beams system by utilizing carbon fiber-reinforced polymer (CFRP) sheets to strengthen the structure following a fire incident. The RC structure showed indicators of deterioration, including deflections, concrete cracking, and concrete spalling in some zones. Whereas, a detailed presentation of the strengthening procedure as well as its evaluation, rationale for the loading procedure, instrumentation needs, assessment criteria, and outcomes of the field testing. The study concentrated on assessing the structure of the RC slab-beam system with widespread cracking in both the positive and negative moment areas. The finite element model was created and examined to help with the load test design, and it confirmed the field findings considerably. The proposed finite element (FE) model demonstrated a reduced estimation of net deflection value in comparison to the corresponding actual values. It maintained a highly acceptable mean value of 0.843 and a small deviation limit of 6.8%.
Employee Stealing or internal theft is considered from the passive practices that can’t be denied or be hidden, In spite of the hospital privacy as a serving organization that works 24\7 and deleing with human lives, they weren’t infallible from that kind of practice. To prevent or reduce this practice, it was important to search for the organizational and behavioral factors influencing internal thefts. The study problem briefly is to reach the most organizational and behavioral factors influencing internal theft, in governmental hospitals in Baghdad Rusafa Health district, this was done by analyzing (20) administrative cases of thefts occurred in the District, also a sample of (60) specialist Doctor’s opinion work, in (3) hospital
... Show MoreThe study showed significant differences between the average weight lens and the average amount protein in the lens between that Kestrel Falco tinnunculus L. and the Collared Dove Streptopelia decaocto F. , also the study electrical migration of lens proteins having one bundle of crystalline –? in Kestrel compared with three bundles in Collared Dove, two bundles of crystalline – ? in both , and crystalline – ? appeared as one bundle in both birds.
We demonstrate a behavior of laser pulse grows through fiber laser inside and output cavity with a soliton fiber laser based on the multi-wall carbon nanotube saturable absorber (SA), we investigate the effects of a saturable absorber parameter on the mode-locking of a realistic Erbium fiber ring laser. Generalized nonlinear Schrodinger equation including the nonlinear effects as gain dispersion, second anomalous group velocity dispersion (GVD), self phase modulation (SPM), and two photon absorption used to describe pulse evolution. An analytical method has been used to understand and to quantify the role of the SA parameter on the propagation dynamics of pulse laser. We compute the chirp, power, width and phase of the soliton for range
... Show MoreA systematic approach is presented to achieve the stable grasping of objects through a two-finger robotic hand, in which each finger cavity was filled with granular media. The compaction of the latter, controlled by vacuum pressure, was used to adjust the structural and contact stiffness of the finger. The grasping stability was studied under the concurrent effect of an external torque and applied vacuum pressure. Stable grasping was defined as the no slippage condition between the grasped object and the two fingers. Three control schemes were adopted and applied experimentally to ensure the effectiveness of the grasping process. The results showed that stable and unstable grasping regions exist for each combination of applied torqu
... Show MoreThe current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for prote
... Show More—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
Abstract. Shatt Al-Arab River was the most important tide river in Iraq, it suffered from neglect and lack of maintenance in the past decades. The river embankment is constantly exposed to erosion processes due to several factors, one of the most important of these factors is the movement of water currents due to the tidal energy coming from the Arabian Gulf. In this study, one dimension unsteady-state model was implemented to study river flood capacity simulation by using HEC-RAS (5.0.7) software in Shatt Al Arab River and its tributaries. The data included flow rate, water level records were collected daily from 2018 to 2020 at different stations along the mentioned river and its feeders, additionally, the considered flood discharge data
... Show MoreBackground: Health professionals have a crucial role in promotion, support and management of breastfeeding. To be effective in this effort, the clinician should focus on the issue from the preconception stage through pregnancy and delivery, and continue in subsequent infant care. Aim of the study: to assess the effectiveness of the UNICEF/WHO 40-hour of breast feeding training through the assess breastfeeding knowledge and attitudes of the health profession staff before and after training course.