The behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be unsatisfactory for deep beams with large web openings. A simplified empirical equation to estimate the shear strength for deep T-beams with large web openings based on the strut-and-tie model was proposed and verified with numerical analysis. The numerical study considered three-dimensional finite element models, in ABAQUS software, that have been developed to simulate and predict the performance of deep beams. The results of numerical simulations were in good agreement and exhibited close correlation with the experimental data. The test results showed that the enlargement in the size of web openings substantially reduces the elements' shear capacity. The experiments revealed that increasing the width of the openings has more effect than the depth at reducing the load-carrying capacity.
This paper provides an identification key to the species of Orthetrum Newman, 1833 (Odonata, Libellulidae), including six species that were collected from different localities in Iraq.
The species of O. anceps (Schneider, 1845) is registered as a new record in Iraq; the most important characters which are used in diagnostic key are included
Pure Cu (CZTSe) and Ag dopant CZTSe (CAZTSe) thin films with Ag content of 0.1 and 0.2 were fabricated on coring glass substrate at R.T with thickness of 800nm by thermal evaporation method. Comparison between the optical characteristics of pure Cu and Ag alloying thin films was done by measuring and analyzing the absorbance and transmittance spectra in the range of (400-1100)nm. Also, the effect of annealing temperature at 373K and 473K on these characteristics was studied. The results indicated that all films had high absorbance and low transmittance in visible region, and the direct bang gap of films decreases with increasing Ag content and annealing temperature. Optical parameters like extinction coefficientrefractive index, and
... Show MoreSome auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones. The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show More