Most studies on deep beams have been made with reinforced concrete deep beams, only a few studies investigate the response of prestressed deep beams, while, to the best of our knowledge, there is not a study that investigates the response of full scale (T-section) prestressed deep beams with large web openings. An experimental and numerical study was conducted in order to investigate the shear strength of ordinary reinforced and partially prestressed full scale (T-section) deep beams that contain large web openings in order to investigate the prestressing existence effects on the deep beam responses and to better understand the effects of prestressing locations and opening depth to beam depth ratio on the deep beam performance and behavior. A total of seven deep beam specimens with identical shear span-to-depth ratio, compressive strength of concrete, and amount of horizontal and vertical web reinforcement ratios have been tested under mid-span concentrated load applied monotonically until failure. The main variables studied were the effects of depth of the web openings and the prestressing location on deep beam performance. The test results showed that the enlargement in the size of web openings substantially reduces the element’s shear capacities while prestressing strands location above the web openings has more effect at increasing the element’s shear capacities. The numerical study considered three-dimensional finite element models that have been developed in Abaqus software to simulate and predict the performance of prestressed deep beams. The results of numerical simulations were in good agreement with the experimental ones.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreBackground: Levetiracetam is a member of the new antiepileptic drugs and has a broad spectrum effect, used as an adjunctive therapy in addition to monotherapy in the treatment of partial onset-seizures. The effect of levetiracetam on the development of embryo nervous system after maternal exposure during pregnancy has not been identified. Objective: to evaluate the effect of antiepileptic drug, levetiracetam (LEV) within its therapeutic dose 350mg/Kg body weight on albino female rat to clarify its effect on the developing cerebral cortex histologically. Material And Methods: Ten pregnant female rats were separated into two groups, control group and experimental group. They were obtained from the animal house of the high institute of inferti
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
TiO2 thin films were deposited by Spray Pyrolysis with thickness ((350±25) nm) onto glass substrates at (350°C), and the film was annealed at temperatures (400 and 500)°C. The structural and morphological properties of the thin films (TiO2) were investigated by X-ray diffraction, Field emission scanning electron microscopy and atomic force microscope. The gas sensor fabricated by evaporating aluminum electrodes using the annealed TiO2 thin films as an active material. The sensitivity of the sensors was determined by change the electrical resistance towards NO2 at different working temperatures (200
Expansive soil spreads in Iraq and some countries of the world. But there are many problems can be occurred to the structures that built on, so we must study the characteristics of these soils due to the problems that may be caused to these structures which built on these kinds of soil and then study the methods of treatment. The present study focuses on improving the geotechnical properties of expansive soils by treating it Metakaolin(M). Metakaolin (M) has never been used before as an improvement material for stabilizing the expansive soil . Metakaolin is a pozzolanic material. It’s obtained by calcination of kaolinite clay at temperatures from 700°C to 800°C. Kaolin chemical composition is
... Show MoreThe present study aimed to investigate the possible protective effect of cafestol against doxorubicin-induced chromosomal and DNA damage in rat bone marrow cells. Wistar
Albino rats of both sexes were administered cafestol (5mg/kg body weight once
Facial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) f
... Show More