The behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be unsatisfactory for deep beams with large web openings. A simplified empirical equation to estimate the shear strength for deep T-beams with large web openings based on the strut-and-tie model was proposed and verified with numerical analysis. The numerical study considered three-dimensional finite element models, in ABAQUS software, that have been developed to simulate and predict the performance of deep beams. The results of numerical simulations were in good agreement and exhibited close correlation with the experimental data. The test results showed that the enlargement in the size of web openings substantially reduces the elements' shear capacity. The experiments revealed that increasing the width of the openings has more effect than the depth at reducing the load-carrying capacity.
An oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreBackground/Objectives: The purpose of this study was to classify Alzheimer’s disease (AD) patients from Normal Control (NC) patients using Magnetic Resonance Imaging (MRI). Methods/Statistical analysis: The performance evolution is carried out for 346 MR images from Alzheimer's Neuroimaging Initiative (ADNI) dataset. The classifier Deep Belief Network (DBN) is used for the function of classification. The network is trained using a sample training set, and the weights produced are then used to check the system's recognition capability. Findings: As a result, this paper presented a novel method of automated classification system for AD determination. The suggested method offers good performance of the experiments carried out show that the
... Show MoreBackground: Denture relining is the process of resurfacing of the tissue side of the ill fitting denture, the bond strength at the relining-denture base interface is most important for denture durability.The aim of present study was to evaluate the shear bond strength between the thermosens as relining material and different denture base materials that bonded by thermo fusing liquid. As this corrective procedureis the common chair side procedure in the dental clinic. Material and method: Sixty samples were prepared and divided into three main groups according to the type of denture base materials.Group (A) referred to the heat cure acrylic samples which consisted of 20 samples. Group (B) referred to the high impact acrylic samples which con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe aim of the research is the knowing of the academic Scientific Journals of the colleges of University of Baghdad , through searching in the University of Baghdad website and the websites of colleges and thus studying the presentation of these journals in those website , and this is done by surfing the main pages of the websites for the colleges included in the research , and by analyzing the research made a menu for all the academic Scientific Journals for all institutes of the University of Baghdad , which simplifies the way for the researchers to publish these researches in the specific journals for their specialties .
Many researchers have tackled the shear behavior of Reinforced Concrete (RC) beams by using different kinds of strengthening in the shear regions and steel fibers. In the current paper, the effect of multiple parameters, such as using one percentage of Steel Fibers (SF) with and without stirrups, without stirrups and steel fibers, on the shear behavior of RC beams, has been studied and compared by using Finite Element analysis (FE). Three-dimensional (3D) models of (RC) beams are developed and analyzed using ABAQUS commercial software. The models were validated by comparing their results with the experimental test. The total number of beams that were modeled for validation purposes was four. Extensive pa
... Show MoreThe amount of information on the web is growing rapidly and number of web sites
becomes huge, so set of web applications used to help user and give him some information
about these sites, especially in e- business, news and sites introduce services.
Since Web site is built by comparatively free description, it is difficult to perform
absolute evaluation. So, rating of Web site is performed from various viewpoints.
In this paper we proposed method for ranking and rating using the web service and java
script to motivation remote server and return some public information to the site user and
other private information to owner.
Background: The present study was conducted to evaluate the effects of different bleaching methods on the shear bond strength of orthodontic Sapphire brackets bonded to human premolars teeth using light cured composite resin and to determine the predominant site of bond failure. Materials and Methods: Thirty freshly extracted human premolars were selected and randomly divided into three groups (10 per group). These groups are: control (unbleached) group, hydrogen peroxide group (HP) 37.5% ; which is the in- office bleaching method group, carbamide peroxide group (CP) 16%; which is the at- home bleaching method group. After bleaching process was performed, all the teeth stored in distilled water in a sealed container at room temperature for
... Show More