In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated through the strain profiles, stress distribution, normal force-axial strain, and moment-curvature relationships, shows that the numerical model has good numerical accuracy and is capable of predicting the behavior of structural concrete members with different partially prestressing ratios at serviceability and ultimate loading stages.
Contemporary developments in various sciences and the impact of technological changes require an integrated vision of the activities and work of the organization in Iraq in light of the high costs of products and their low quality compared to imported products of high quality and low cost, and the need to use modern cost techniques based on a clear and specific philosophy that contributes to increasing the efficiency and effectiveness of management In the business environment and how it can contribute to reducing product costs and being environmentally friendly at the same time, it is no secret that the main goal of most organizations is to maximize profitability and reduce costs to the minimum, but this matter is not achieved autom
... Show MoreIn this work, strains and dynamic crack growth were studied and analyzed in thin flat plate with a surface crack at the center, subjected to cycling low velocity impact loading for two types of aluminum plates (2024, 6061). Experimental and numerical methods were implemented to achieve this research. Numerical analysis using program (ANSYS11-APDL) based on finite element method used to analysis the strains with respect to time at crack tip and then find the velocity of the crack growth under cycling impact loading. In the experimental work, a rig was designed and manufactured to applying the cycling impact loading on the cracked specimens. The grid points was screened in front of the crack tip to measure the elastic-plas
... Show MoreAbstract
Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it
... Show MoreGingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreBN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15
Liquefied petroleum gases (LPG) consist of hydrocarbons obtained by refining crude oil, either from propane or butane or a mixture of the two. There are often other components such as propylene, butylene or other hydrocarbons, but they are not the main component. The study aims to review previous studies dealing with designing an LPG system to deliver gas to residential campuses and buildings. LPG is extracted from natural gas NG by several processes, passing through fractionation towers and then pressuring into CNG storage tanks. Gas contains several problems, including gas leakage through the pipes and leads to fires or explosions in LPG storage and distribution tanks, so safety conditions were taken in the design and implementation. T
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreBackground: Maxillary canines are important aesthetically and functionally, but impacted canines are more difficult and time consuming to treat, the aim of this study is to investigate with multi-detector computed tomography the correlation between the bone density and the upper canine impaction. Material and method: A sample of Unilaterally impacted maxillary canines from 24 patients (19 female, 5 male) who were referred to accurately localize the impacted canines at al- Karkh general hospital were evaluated by a volumetric 3-d images by the multi-detector computed tomography to accurately measure the bone density of the maxillary cortical palate of the maxillary impacted canine side and compare it with the other side of the normally erupt
... Show More