This paper studies the behavior of axially loaded RC columns which are confined with carbon fiber reinforced polymers’ sheet (CFRP) and steel jackets (SJ). The study is based on twelve axially loaded RC columns tested up to failure. It is divided into three schemes based on its strengthening type; each scheme has four columns. The main parameters in this study were the compressive strength of the concrete and steel reinforcement ratio. Furthermore, the results of the experimental test showed a substantial enhancement in the column's load-carrying capacity. When compared to the original columns, the CFRP sheet had a significant effect on improving the ductility of the column by increasing the axial deformation by about 59.2 to 95.7%. On the other hand, the SJ contributed mostly to the column load-carrying capacity, which increased the capacity of RC concrete from 75 to 107%; because of its composite action comparing with the CFRP sheet action in which unidirectional lateral confinement is provided. Both methods produced completely different failure modes. The columns strengthened with CFRP sheet failed by rupture occurring in the sheet fibers. The strengthened with SJ failed due to the buckling that occurred in the steel angles due to the direct contact with the head of the column, and crushing in the concrete has occurred.
The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show MoreIn this research constructed N2 laser system by use developed method of electric discharge. In this method used four step of electric discharge by using four capacitors, three spark gaps, high tension power supply varying in range from 12kV to 24 kV and three resistors, this method called three stage blumlein circuit. The breakdown time delay of these parallel spark gaps cement strong ultraviolet preionization in the laser channel, thus the result of these amendments the laser output is many doubled and is more increasing than that obtained using the one and two stage blumlein circuits. This system has been designed and operated to give pulse laser with wavelength at 337.1 nm. This laser system can operate without mirrors and optical res
... Show MoreWe report on using a CO2 (10.6 µm) laser to debond the lithium disilicate veneers. Sixty-four sound human premolar teeth and 64 veneer specimens were used in the study. The zigzag movement via CO2 laser handpiece along with an air-cooled jet to prevent temperature elevation above the necrosis temperature limit (5.5 C°) was applied. The optimal deboning irradiation time was super-fast, at about 5 seconds at 3 Watt CO2 laser power. It is 20 times less than any previously published work for veneers debonding. The enamel beneath the debonded veneers has been assessed by atomic force microscopy (AFM) and shear stress technique as criteria for the easiness of debonding. The
... Show MoreThe world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.