This paper presents an experimental study for strengthening existing columns against axial compressive loads. The objective of this work is to study the behavior of concrete square columns strengthening with circulation technique. In Iraq, there are significantly more reinforced rectangular and square columns than reinforced circular columns in reinforced concrete buildings. Moreover, early research studies indicated that strengthening of rectangular or square columns using wraps of CFRP (Carbon Fiber Reinforced Polymer) provided rather little enhancement to their load-carrying capacity. In this paper, shape modification technique was performed to modify the shape (cross section) of the columns from square columns into circular columns. Shape modification technique is also called circularization technique because the cross section is modified from square into circular cross section. Then, the circularized columns were wrapped with CFRP wraps. Shape modification is the strengthening method adopted in this paper as a mean to strengthen existing square columns. Columns studied in this paper are short columns with square sections as a special case of rectangular columns. Columns in this study are plain concrete columns (having concrete strength of = 24.41 MPa) with no internal steel reinforcement. The aim of this research is to study experimentally the behavior of circularized concrete square columns confined with CFRP wraps. Then, for better understanding, the results were compared with another, more widely used, strengthening technique which is the direct wrapping of square columns with CFRP wraps. Thus, investigating experimentally the effectiveness of the two aforementioned strengthening techniques in increasing the load-carrying capacity and ductility of the existing concrete columns. The methodology of this research is that six plain concrete short square columns were casted. These six columns were exerted to compressive pressure using concrete testing machine. These six columns were divided into three groups, each group consisted of 2 columns. The three groups were classified as follows: first group (titled L0) consisted of two square columns which were not strengthened by any method, second group (titled L1) consisted of two square columns confined by one layer of CFRP wraps, finally, the third group (titled LC1) consisted of two circularized square columns confined by one layer of CFRP wraps.Experimental results showed that load bearing capacity and ductility of square columns have been significantly enhanced. Test results showed that shape modification technique (columns LC1) produced enhancement in load carrying capacity about 167.8 % of the original non-strengthened columns (columns L0). Furthermore, square columns wrapped by one layer of CFRP wraps (columns L1) produced enhancement in load carrying capacity about 56.1% of the original non-strengthened columns (columns L0). As such, it was evident that circularization technique resulted in enhancement in load carrying capacity far more than the enhancement obtained from wrapping the square columns with CFRP wraps.
Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever exam
... Show MoreThe present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare
... Show MoreThe study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreWith growing global demand for hydrocarbons and decreasing conventional reserves, the gas industry is shifting its focus in the direction of unconventional reservoirs. Tight gas reservoirs have typically been deemed uneconomical due to their low permeability which is understood to be below 0.1mD, requiring advanced drilling techniques and stimulation to enhance hydrocarbons. However, the first step in determining the economic viability of the reservoir is to see how much gas is initially in place. Numerical simulation has been regarded across the industry as the most accurate form of gas estimation, however, is extremely costly and time consuming. The aim of this study is to provide a framework for a simple analytical method to esti
... Show MoreZinc Oxide (ZnO) thin films of different thickness were prepared
on ultrasonically cleaned corning glass substrate, by pulsed laser
deposition technique (PLD) at room temperature. Since most
application of ZnO thin film are certainly related to its optical
properties, so the optical properties of ZnO thin film in the
wavelength range (300-1100) nm were studied, it was observed that
all ZnO films have high transmittance (˃ 80 %) in the wavelength
region (400-1100) nm and it increase as the film thickness increase,
using the optical transmittance to calculate optical energy gap (Eg
opt)
show that (Eg
opt) of a direct allowed transition and its value nearly
constant (~ 3.2 eV) for all film thickness (150
The geometric morphometric technique was used to study the variables in the shape and size wings of different populations of mosquitoes Culex quinquefasciatus from different Iraqi provinces Babylon, Baghdad and Wasit. The results showed that the average of centroid size were 366, 387.5 and 407.4 Micron in Babylon, Baghdad and Kut, respectively. The statistical analysis showed that there were no significant differences in the average of centroid size of all specimens and they belong to the same species.
The aim of this research is to identify the effect of Webinar technique on digital culture in the College of Education for pure sciences at Ibin Haitham, University of Baghdad. The research samples consisted of (68) male and female students from the Chemistry Department who are following classes during the (2019- 2020) academic year. The samples represent (42%) of the total number of (162) students split into control and experimental groups. For this purpose, the scientific contents for testing were determined. The experimental part is based on analysis of the results from experiments in (preliminary standard solutions, refractive index, Beer-Lambert law). To achieve the aim of the research in testing the measure of student's digital cultur
... Show More