This paper presents an experimental study for strengthening existing columns against axial compressive loads. The objective of this work is to study the behavior of concrete square columns strengthening with circulation technique. In Iraq, there are significantly more reinforced rectangular and square columns than reinforced circular columns in reinforced concrete buildings. Moreover, early research studies indicated that strengthening of rectangular or square columns using wraps of CFRP (Carbon Fiber Reinforced Polymer) provided rather little enhancement to their load-carrying capacity. In this paper, shape modification technique was performed to modify the shape (cross section) of the columns from square columns into circular columns. Shape modification technique is also called circularization technique because the cross section is modified from square into circular cross section. Then, the circularized columns were wrapped with CFRP wraps. Shape modification is the strengthening method adopted in this paper as a mean to strengthen existing square columns. Columns studied in this paper are short columns with square sections as a special case of rectangular columns. Columns in this study are plain concrete columns (having concrete strength of = 24.41 MPa) with no internal steel reinforcement. The aim of this research is to study experimentally the behavior of circularized concrete square columns confined with CFRP wraps. Then, for better understanding, the results were compared with another, more widely used, strengthening technique which is the direct wrapping of square columns with CFRP wraps. Thus, investigating experimentally the effectiveness of the two aforementioned strengthening techniques in increasing the load-carrying capacity and ductility of the existing concrete columns. The methodology of this research is that six plain concrete short square columns were casted. These six columns were exerted to compressive pressure using concrete testing machine. These six columns were divided into three groups, each group consisted of 2 columns. The three groups were classified as follows: first group (titled L0) consisted of two square columns which were not strengthened by any method, second group (titled L1) consisted of two square columns confined by one layer of CFRP wraps, finally, the third group (titled LC1) consisted of two circularized square columns confined by one layer of CFRP wraps.Experimental results showed that load bearing capacity and ductility of square columns have been significantly enhanced. Test results showed that shape modification technique (columns LC1) produced enhancement in load carrying capacity about 167.8 % of the original non-strengthened columns (columns L0). Furthermore, square columns wrapped by one layer of CFRP wraps (columns L1) produced enhancement in load carrying capacity about 56.1% of the original non-strengthened columns (columns L0). As such, it was evident that circularization technique resulted in enhancement in load carrying capacity far more than the enhancement obtained from wrapping the square columns with CFRP wraps.
Thirty three specimens of the blue-cheeked bee-eater were collected at central and southern Iraq from April 1997 to October 2000. Two nematodes Hadjelia truncata and Syphaciella capensis, were recovered from the alimentary tract. Reporting these two nematodes represents the first record for Iraq as well as a new host record.
The purpose of this paper is to find the best multiplier approximation of unbounded functions in –space by using some discrete linear positive operators. Also we will estimate the degree of the best multiplier approximation in term of modulus of continuity and the averaged modulus.
The Early-Middle Miocene succession in Iraq is represented by the Serikagni, Euphrates and Dhiban formations, which deposited during the Early Miocene. The Jeribe and Fatha successions were deposited during Middle Miocene age. This study includes microfacies analysis, depositional environments, sequence stratigraphy and basin development of Early – middle Miocene in Hamrin and Ajeel oil fields and Mansuriyha Gas Field. The study area includes four boreholes in three oil fields located in central Iraq: Hamrin (Hr-2) and Ajeel (Aj-13, and 19) oil feilds, and Mansuriyha (Ms-2) Gas Field. Five facies associations were distinguished within the studied fields: deep marine, slop, platform-margin, open marine, restricted interior platform
... Show MoreThe purpose of my thesis is to synthesis two new bidentate ligands which were used to prepare series of metal complexes by reacting the ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) Succinyl chloride was used as starting material to synthesis two bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline (L1) and (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that are: (L1) = N1,N4-bis (4-chloro phenyl ) succinamide (L2) =N1,N4-bis(4-acetylphenyl)succinamide The new ligands were characterize by using spectroscopic study (Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra
... Show MoreIn this study, concentrations of radon and uranium were measured for twenty six samples of soil. The radon concentrations in soil samples measured by registrant alpha-emitting radon (222Rn) by using CR-39 track detector. The uranium concentrations in soil samples measured by using registrar fission fragments tracks in CR-39 track detector that caused by the bombardment of U with thermal neutrons from 241 Am-Be neutron source that has flux of 5 ×103n cm-2 s-1.
The concentrations values were calculated by a comparison with standard samples The results show that the radon concentrations are between (91.931-30.645Bq/m3).
The results show that also the uranium concentrat
The process of stocks evaluating considered as a one of challenges for the financial analysis, since the evaluating focuses on define the current value for the cash flows which the shareholders expected to have. Due to the importance of this subject, the current research aims to choose Fama & French five factors Model to evaluate the common stocks to define the Model accuracy in Fama& French for 2014. It has been used factors of volume, book value to market value, Profitability and investment, in addition to Beta coefficient which used in capital assets pricing Model as a scale for Fama & French five factors Model. The research sample included 11 banks listed in Iraq stock market which have me
... Show MoreBackground: Most primary Health Care Centers (PHCCs) in Iraq have a referral system records; however, this mechanism does not function well because of the lack of other requirements for an efficient referral system.
Objective: To assess the practice & opinion of doctors in PHCs toward the referral system, and to determine the doctors in PHC's commitment to referral system instructions and guidelines.
Subjects and methods: A cross-sectional study with analytic elements was conducted in nine health directorates in Iraq, from the 1st October 2018 – 30th June 2019.One PHC was selected randomly form each sector in every governorate, A questionnaire was used to collect the required information.
... Show MoreEndothelin-1 (ET-1) is a potent vasoconstrictor hormone that has been identified as an important factor
responsible for the development of cardiovascular dysfunctions. ET-1 exerts its vasoconstrictor activity
through two pharmacologically distinct receptors, ETA and ETB that are found in vascular smooth muscle
cells (VSMCs) and the vasodilator activity through an ETB receptor located on endothelial cells. This study
aimed to show the impact of 1µM L-arginine (LA), 100µM tetrahydrobiopterin (BH4), and their combined
effect on ET-1 activity in both lead-treated and lead-untreated rat aortic rings. This means, investigating how
endothelial dysfunction reverses the role of nitric oxide precursor and cofa
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreTwo series of 1,3,4-oxadiazole derivatives at the sixth position of the 2,4-di-