This research is carried out to study the effect of the external post-tensioning technique on the flexural capacity of simply supported composite castellated beam experimentally. In this research, seven composite castellated beams having the same dimensions and material properties were cast and tested up to failure by applied two concentrated loads at 700 mm from each end. Two external strands of 12.7 mm diameter were fixed at each side of the web of strengthening beams and located at depth 180 mm from top fiber of the section (dps) at each end of the beam. The strands have been tensioned by using a hydraulic jack with a constant stress of 100 MPa. This research aims to study the effect of the strengthening by different shapes of strand profiles of external post-tensioning techniques on the flexural capacity of the composite castellated beam. These beams were divided into three groups. Each group contained two composite castellated beams while 7th composite castellated beam kept without strengthening by external post-tensioning technique As control beam. The first group included two beams with straight strand profile of external Post-tensioning. The second group included two beams with a triangular strand profile of external post-tensioning. The third group included two beams with a trapezoidal strand profile of external post-tensioning. All composite castellated beams were simply supported, and all of them were fully shear connections between the concrete slab and steel girder. All beams included the 16 castellated openings and were stiffened by six stiffener plates welded on the web of castellated beams. Three stiffener plates are welded on each side of the web. Two of these stiffener plates welded at the middle of the beam, and four of them welded at locations under the loads. The experimental results of this research were increasing 5.43% in load capacity of an average of the straight profile of composite castellated beams, increasing 18.92% in load capacity of an average of triangular profile composite castellated beams, and increasing 20.71% in load capacity of the trapezoidal profile of composite castellated beams. All the above results were compared with control beams.
The present work introduces, external morphological study of the leafhopper Neoalitarus
fenestratus Herrich-Schäeffer (Deltocephalinae:Oposiini), particularly the male genitalia
which were dissected and illustrated.
In this study, composite materials consisting of Activated Carbon (AC) and Zeolite were prepared for application in the removal of methylene blue and lead from an aqueous solution. The optimum synthesis method involves the use of metakaolinization and zeolitization, in the presence of activated carbon from kaolin, to form Zeolite. First, Kaolin was thermally activated into amorphous kaolin (metakaolinization); then the resultant metakaolin was attacked by alkaline, transforming it into crystalline zeolite (zeolitization). Using nitrogen adsorption and SEM techniques, the examination and characterization of composite materials confirmed the presence of a homogenous distribution of Zeolite throughout the activated carbon.
... Show Moreلمعرفة مدى تأثير تمرينات مهارية وفق تقنية تركيز للتفكير الجاني على الدقة الحركة وتعلم هجمة الإيقاف بالغطس للطلاب في سلاح الشيش استخدمت الباحثتان المنهج التجريبي على عينة من طلاب المرحلة الثالثة بكلية التربية البدنية وعلوم الرياضة –جامعة ديالى والتي بلغت (30) طالباً موزعين على مجموعتين التجريبية والضابطة وبعد إكمال اجراءات البحث وتطبيق الاختبارات القبلية وتنفيذ التمرينات والاختبار البعدي ومعالجة الب
... Show MoreShoulder immobilization is one of the injuries that lead to disability and loss of movement in the joint within a short time, which called the researchers to find appropriate therapeutic means to rehabilitate this injury. They prepared a rehabilitation program accompanying the reflexology technique to rehabilitate the injury of the immobilized shoulder of the small degree and improve the range of movement and muscle strength working on the shoulder joint The sample was selected from the male patients aged (40-50) years. The muscle strength test was used using the force sensor, the shoulder range test from the flexion and extension position and the visual analog test to measure the level of pain. The study concluded that the pre-rehabilitati
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreWarm dark matter (WDM) models offer an attractive alternative to the current cold dark matter (CDM) cosmological model. We present a novel method to differentiate between WDM and CDM cosmologies, namely, using weak lensing; this provides a unique probe as it is sensitive to all of the “matter in the beam,” not just dark matter haloes and the galaxies that reside in them, but also the diffuse material between haloes. We compare the weak lensing maps of CDM clusters to those in a WDM model corresponding to a thermally produced 0.5 keV dark matter particle. Our analysis clearly shows that the weak lensing magnification, convergence, and shear distributions can be used to distinguish
In this paper, fire resistance and residual capacity tests were carried out on encased pultruded glass fiber-reinforced polymer (GFRP) I-beams with high-strength concrete beams. The specimens were loaded concurrently under 25% of the ultimate load and fire exposure (an increase in temperature of 700 °C) for 70 min. Subsequently, the fire-damaged specimens were allowed to cool and then were loaded statically until failure to explore the residual behaviors. The effects of using shear connectors and web stiffeners on the residual behavior were investigated. Finite Element (FE) analysis was developed to simulate the encased pultruded GFRP I-beams under the effect of fire loading. The thermal analyses were performed using the general-pu
... Show More