The main objective of this paper is to study the behavior of Non-Prismatic Reinforced Concrete (NPRC) beams with and without rectangular openings either when exposed to fire or not. The experimental program involves casting and testing 9 NPRC beams divided into 3 main groups. These groups were categorized according to heating temperature (ambient temperature, 400°C, and 700°C), with each group containing 3 NPRC beams (solid beams and beams with 6 and 8 trapezoidal openings). For beams with similar geometry, increasing the burning temperature results in their deterioration as reflected in their increasing mid-span deflection throughout the fire exposure period and their residual deflection after cooling. Meanwhile, the existing ope
... Show MoreBackground :Atherosclerosis is the most
frequent underlying cause of ischemic heart
disease and a major cause of death all over the
world. This study was carried out to analyze and
compare the angiographic findings in patients
with diabetes mellitus versus non diabetics with
coronary heart disease , and to correlate these
findings with some risk factors for coronary
heart disease.
Methods: A total of 100 patients were studied,
50 with diabetes mellitus, and 50 non diabetics.
This study was carried out at Al-Sadr teaching
hospital in Basrah, Southern Iraq during the
period April 2009- September 2009. All patients
were known to have coronary heart disease. Risk
factors for coronary heart disease
The BEK family of flows have many important practical applications such as centrifugal pumps, steam turbines, turbo-machinery and rotor-stator devices. The Bödewadt, Ekman and von Kármán flows are particular cases within this family. The convective instability of the BEK family of rotating boundary-layer flows has been considered for generalised Newtonian fluids, power-law and Carreau fluids. A linear stability analysis is conducted using a Chebyshev collocation method in order to investigate the effect of shear-thinning and shear-thickening fluids for generalised Newtonian fluids on the convective Type I (inviscid crossflow) and Type II (viscous streamline curvature) modes of instability. The results reveal that shear-thinning power-law
... Show MoreThis work presents experimental research using draped prestressed steel strands to improve the load-carrying capacity of prestressed concrete non-prismatic beams with multiple openings of various designs. The short-term deflection of non-prismatic prestressed concrete beams (NPCBs) flexural members under static loading were used to evaluate this improvement. Six simply supported (NPCBs) beams, five beams with openings, and one solid specimen used as a reference beam were all tested as part of the experiment. All of the beams were subjected to a monotonic midpoint load test. The configuration of the opening (quadrilateral or circular), as well as the depth of the chords, were the varia
Non-prismatic reinforced concrete (RC) beams are widely used for various practical purposes, including enhancing architectural aesthetics and increasing the overall thickness in the support area above the column, which gives high assurance to services that this will not result in the distortion of construction features and can reduce heights. The hollow sections (recess) can also be used for the maintenance of large structural sections and the safe passage of utility lines of water, gas, telecommunications, electricity, etc. They are generally used in large and complex civil engineering works like bridges. This study conducted a numerical study using the commercial finite element software ANSYS version 15 for analysing RC beams, hol
... Show MoreThe theoretical analysis depends on the Classical Laminated Plate Theory (CLPT) that is based on the Von-K ráman Theory and Kirchhov Hypothesis in the deflection analysis during elastic limit as well as the Hooke's laws of calculation the stresses. New function for boundary condition is used to solve the forth degree of differential equations which depends on variety sources of advanced engineering mathematics. The behavior of composite laminated plates, symmetric and anti-symmetric of cross-ply angle, under out-of-plane loads (uniform distributed loads) with two different boundary conditions are investigated to obtain the central deflection for mid-plane by using the Ritz method. The computer programs is built using Ma
... Show MoreEconomic analysis plays a pivotal role in managerial decision-making processes. This analysis is predicated on deeply understanding economic forces and market factors influencing corporate strategies and decisions. This paper delves into the role of economic data analysis in managing small and medium-sized enterprises (SMEs) to make strategic decisions and enhance performance. The study underscores the significance of this approach and its impact on corporate outcomes. The research analyzes annual reports from three companies: Al-Mahfaza for Mobile and Internet Financial Payment and Settlement Services Company Limited, Al-Arab for Electronic Payment Company, and Iraq Electronic Gateway for Financial Services Company. The paper concl
... Show MoreThe existing investigation explains the consequence of irradiation of red laser on the optic properties of (CoO2) films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser in this technique. From the XRD analysis, the crystalline existence with trigonal crystal system was when the received films were processed by continuous red laser (700 nm) with power (>1000mW)for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time(0,30,45,60,75,90 mi
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More