Strengthening of the existing structures is an important task that civil engineers continuously face. Compression members, especially columns, being the most important members of any structure, are the most important members to strengthen if the need ever arise. The method of strengthening compression members by direct wrapping by Carbon Fiber Reinforced Polymer (CFRP) was adopted in this research. Since the concrete material is a heterogeneous and complex in behavior, thus, the behavior of the confined compression members subjected to uniaxial stress is investigated by finite element (FE) models created using Abaqus CAE 2017 software. The aim of this research is to study experimentally and numerically, the behavior of square plain (without steel reinforcement) concrete compression members, that has concrete strength of = 24.41 MPa, confined with one layer of CFRP wraps under uniaxial compressive loading. Finally, the outcomes are compared with the finite element models using Abaqus software. Laboratory experimental results showed that confining compression members with CFRP wraps is an efficient strengthening method. In terms of load carrying capacity, an enhancement was measured for about 56.1% of the reference non-confined members. This enhancement was also reached using Abaqus software.
The current report dealt with the effect of pesticides on the ecosystem through their impact on soil, water, and microorganisms and their impact on human health. As well as this study dealt with the biodegradation process of pesticides and the organisms involved in this process, even some previous studies proved that Bacillus spp. And Pseudomonas sp. Bacteria is the most efficient in the biodegradation of pesticides, at the same time, other previous studies dealt with the environmental factors that affect the biodegradation process of pesticides. It proved that each of the incubation periods, pH, and temperature have different effects on biodegradation. Most of the studies indicated that the best incubation period for biodegradation is 7-8
... Show MorePraise be to God, Lord of the worlds, and the best of prayers, and the completion of the blessing of our master Muhammad Al-Hadi Al-Amin, his family and companions, the righteous and those who followed his path and guided him to the day of judgment.
And after:
It is God's human honor that he has legalized marriage and made optimal goals and intentions for her:
1 establish a safe and reassuring life between the husband and his wife based on the tranquility and love and compassion is achieved through satisfying the instincts of the road project from the verse: and that He created for you mates from among yourselves to find repose in them and put between you affection and mercy in this are Signs for those who reflect ()
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe aim of this research is to demonstrate the impact of credit risk on the banks of the study sample on the granting of loans and credit facilities, and try to reduce the size of credit risk to banks as a result of granting loans and credit facilities, credit risk is the oldest form of risk in financial markets. Every financial institution takes a degree of risk when it gives loans and credit facilities to companies and customers, It is exposed to financial losses when some borrowers fail to repay their loans as agreed, and at the same time credit facilities are the most profitable operations of the bank as it is the most profitable banking operations than other operations, so it represents the research communit
... Show More
