This paper studies the behavior of axially loaded RC columns which are confined with carbon fiber reinforced polymers’ sheet (CFRP) and steel jackets (SJ). The study is based on twelve axially loaded RC columns tested up to failure. It is divided into three schemes based on its strengthening type; each scheme has four columns. The main parameters in this study were the compressive strength of the concrete and steel reinforcement ratio. Furthermore, the results of the experimental test showed a substantial enhancement in the column's load-carrying capacity. When compared to the original columns, the CFRP sheet had a significant effect on improving the ductility of the column by increasing the axial deformation by about 59.2 to 95.7%. On the other hand, the SJ contributed mostly to the column load-carrying capacity, which increased the capacity of RC concrete from 75 to 107%; because of its composite action comparing with the CFRP sheet action in which unidirectional lateral confinement is provided. Both methods produced completely different failure modes. The columns strengthened with CFRP sheet failed by rupture occurring in the sheet fibers. The strengthened with SJ failed due to the buckling that occurred in the steel angles due to the direct contact with the head of the column, and crushing in the concrete has occurred.
Find cares studying ways in the development of industrial products and designs: the way the progressive development (how typical) and root development (jump design), was the aim of the research: to determine the effectiveness of the pattern and the jump in the development of designs and industrial products. After a process of analysis of a sample of research and two models of contemporary household electrical appliances, it was reached a set of findings and conclusions including:1-leaping designs changed a lot of entrenched perceptions of the user on how the product works and its use and the size and shape of the product, revealing him about the possibilities of sophisticated relationships with the product, while keeping the typical desi
... Show MoreBACKGROUND: Femoral shaft fracture is a common fracture in pediatric age group reaching 62% of all fracture shaft femur in children in spite of rapid union rate and successful conservative treatment but some cases need surgical intervention and one of the methods using plate and screw by the lateral approach. AIM: This study aims to compare functional outcome fixation of mid-shaft femur fracture in children by plate and screws between (subvastus lateralis and transvastus lateralis) regarding infection, union, and limitation of knee movement. PATIENT AND METHOD: The study was done on 30 children who had diaphyseal fracture femur in Al-Kindy Teaching Hospital in period (April 2018–April 2020) with 6 months follow-up, and the pa
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreContemporary life is racing against time in its temptations and variables, and it has become shaped and changed in an amazing way in its various aspects and fields. This was facilitated by intellectual and scientific communication between civilizations, and the rapid progression in successive inventions and discoveries in the fields of science and arts of knowledge. This contributed to a great economic and commercial renaissance. Then, these economic developments entered the world into a very strong competition, which forced producers to calculate all production costs, to reach the highest profits by reducing the price of the produced commodity on the one hand, and achieving quality in appearance (especially) on the other hand. Since the ma
... Show MoreThis work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show MoreThis paper presents a numerical analysis of the piled-raft foundation (PRF) based on the actual behavior of supporting piles. The raft was modeled as a thin plate, while the piles were modeled as springs in different ways. This research also aims to propose an analytical model of piles based on actual behavior at fieldwork. The results proved that the structural behavior of raft member can be improved through utilizing the actual behavior of supporting piles. When the piles were modeled as non-linear stiffness springs, settlements and bending stresses of raft foundation were reduce marginally as compared with those obtained from piles with linear stiffness springs.
The analysis of Iraqi light oil (light naphtha) by capillary gas chromatography- mass spectrometry (GC-MS) was performed by the injection of whole naphtha sample without use of solvents. Qualitative analysis and the identification of the hydrocarbon constituents of light naphtha was performed and comparison had been done with American light oil (light naphtha). The obtained results showed a major difference between the two-light naphtha.
In this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best
... Show MoreThis study is a numerical investigation of the performance of reinforced concrete (RC) columns after fire exposure. This study aims to investigate the effect of introducing lateral ties and using the RC jacket on improving post-fire behavior of these columns, the effect of the duration of the fire on ultimate load of columns. The analysis was performed through ABAQUS, a 3D – non-linear finite element program. 4 m tall lengthening square RC column with a cross- section of 0.4 m × 0.4 m was used as a test specimen. The RC column was reinforced by 4Ø28 mm longitudinal bars bonded by steel tie bars of Ø10 mm spaced at 400 mm. The firing temperature was increased to 60
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More