This article presents the results of an experimental investigation of using carbon fiber–reinforced polymer sheets to enhance the behavior of reinforced concrete deep beams with large web openings in shear spans. A set of 18 specimens were fabricated and tested up to a failure to evaluate the structural performance in terms of cracking, deformation, and load-carrying capacity. All tested specimens were with 1500-mm length, 500-mm cross-sectional deep, and 150-mm wide. Parameters that studied were opening size, opening location, and the strengthening factor. Two deep beams were implemented as control specimens without opening and without strengthening. Eight deep beams were fabricated with openings but without strengthening, while the other eight deep beams were with openings in shear spans and with carbon fiber–reinforced polymer sheet strengthening around opening zones. The opening size was adopted to be 200 × 200 mm dimensions in eight deep beams, while it was considered to be 230 × 230 mm dimensions in the other eight specimens. In eight specimens the opening was located at the center of the shear span, while in the other eight beams the opening was attached to the interior edge of the shear span. Carbon fiber–reinforced polymer sheets were installed around openings to compensate for the cutout area of concrete. Results gained from the experimental test showed that the creation of openings in shear spans affect the load-carrying capacity, where the reduction of the failure load for specimens with the opening but without strengthening may attain 66% compared to deep beams without openings. On the other hand, the strengthening by carbon fiber–reinforced polymer sheets for beams with openings increased the failure load by 20%–47% compared with the identical deep beam without strengthening. A significant contribution of carbon fiber–reinforced polymer sheets in restricting the deformability of deep beams was observed.
Abstract Kidney stones are one of the most common and most painful medical problems known (1). Nurses assess and monitor patients through diagnosis and treatment and teach patients how to avoid recurrence of stones (2). A descriptive study was conducted on 150 patients diagnosed with recurrent kidney stones, who were attending the out patients consultation urology disease clinics at surgical specialties, Al-Kadhimia, Al-Yarmook, and Al-Karama Teaching Hospital and Extracorporeal shock wave lithotripsy (ESWL) departments for the period from the 1st of Feb. 2002 through to the end of May 2004. The aim of
Leigh's syndrome, or sub acute necrotizing encephalomyelopathy, is a rare inherited neurometabolic disease of infancy and early childhood with variable course and prognosis. Rarely, it occurs in juveniles and adults. The diagnosis is difficult and still remains to challenge the clinicians on the basis of history; hence the role of imaging is very essential. It is the neuroimaging, chiefly the Magnetic Resonance Imaging showing characteristic symmetrical necrotic lesions in the basal ganglia and/or brain stem that leads to the diagnosis. Late-onset varieties are rare and only few cases were reported all over the world. Here, I report a case of late onset (juvenile) Leigh syndrome presenting with an acute polyneuropathy. Neuroimaging confi
... Show MoreThe study was trail to treated secondary hydatid cysts in white micepost-infection with Echinococcosis of sheep origin, by immunization with a mixture of CFAgs/PSAgs prepared from haydatid Cyst Fluid antigens (CFAgs) and Proto scolices antigens (PSAgs) respectively, two concentrations (7.5 &15 mg/ml) in addition to two derivatives of benzimidazole; albendazole (A) and mebendazole (M) 10 and 40μg/gm body weight, respectively, one week after challenged dose with protoscolices. to determine the efficacy of immunization and chemotherapy simultaneously in reduction the number of growing cysts, then measured both humoral and cell-mediated immunity. Results: elevation the immune responses that reflected decrease number and diameter of hydatid cys
... Show MorePoly [2-methoxy-5-(2-ethylhexyloxy)-1, 4-phenylenevinyl] (MEH-PPV) thin films were created in this study using both spin coating and drop casting processes. MEH-PPV thin films generated by Ferric Chloride (FeCl3) doping (0.03, 0.06, 0.09, and 0.12 wt%) were studied for some physical features using Fourier-Transform Infrared Spectroscopy (FTIR), Field Emission Scanning Electron Microscopy (FE-SEM), and Energy Dispersive X-ray Spectroscopy (EDX). An FTIR test showed that there was no chemical reaction that occurred between Ferric Chloride (FeCl3) and MEH-PPV, but rather a physical one, that is, an organic material composite occurred. As for FE-SEM, the pure sample MEH-PPV formed uniformly, but when FeCl3 was added by weight, we have differ
... Show MoreThe interplay of predation, competition between species and harvesting is one of the most critical aspects of the environment. This paper involves exploring the dynamics of four species' interactions. The system includes two competitive prey and two predators; the first prey is preyed on by the first predator, with the former representing an additional food source for the latter. While the second prey is not exposed to predation but rather is exposed to the harvest. The existence of possible equilibria is found. Conditions of local and global stability for the equilibria are derived. To corroborate our findings, we constructed time series to illustrate the existence and the stability of equilibria numerically by varying the different values
... Show MoreA transdermal drug delivery system (TDDS) is characterized by the application of medications onto the skin's surface to deliver drugs at a controlled and predefined rate through the skin. Spanlastics, an elastic nanovesicle capable of transporting various pharmacological substances, shows promise as a drug delivery carrier. It offers numerous advantages over traditional vesicular systems applied topically, including enhanced stability, flexibility in penetration, and improved targeting capabilities. This study aims to develop meloxicam (MX)-loaded spanlastics gel as skin delivery carriers and to look into the effects of formulation factors like Tween80, Brij 35, and carbopol concentration on the properties of spanlastics gel, like pH, drug
... Show MoreIn this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-
... Show MoreIn the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show More