This article presents the results of an experimental investigation of using carbon fiber–reinforced polymer sheets to enhance the behavior of reinforced concrete deep beams with large web openings in shear spans. A set of 18 specimens were fabricated and tested up to a failure to evaluate the structural performance in terms of cracking, deformation, and load-carrying capacity. All tested specimens were with 1500-mm length, 500-mm cross-sectional deep, and 150-mm wide. Parameters that studied were opening size, opening location, and the strengthening factor. Two deep beams were implemented as control specimens without opening and without strengthening. Eight deep beams were fabricated with openings but without strengthening, while the other eight deep beams were with openings in shear spans and with carbon fiber–reinforced polymer sheet strengthening around opening zones. The opening size was adopted to be 200 × 200 mm dimensions in eight deep beams, while it was considered to be 230 × 230 mm dimensions in the other eight specimens. In eight specimens the opening was located at the center of the shear span, while in the other eight beams the opening was attached to the interior edge of the shear span. Carbon fiber–reinforced polymer sheets were installed around openings to compensate for the cutout area of concrete. Results gained from the experimental test showed that the creation of openings in shear spans affect the load-carrying capacity, where the reduction of the failure load for specimens with the opening but without strengthening may attain 66% compared to deep beams without openings. On the other hand, the strengthening by carbon fiber–reinforced polymer sheets for beams with openings increased the failure load by 20%–47% compared with the identical deep beam without strengthening. A significant contribution of carbon fiber–reinforced polymer sheets in restricting the deformability of deep beams was observed.
As usage of internet grows in different applications around the world, many techniques were developed to guard an important data against from illegal access and modification from unauthorized users by embedding this data into visual media called host media. Audio hiding in an image is a challenge because of the large size of the audio signal. Some previous methods have been presented to reduce the data of the audio signal before embedding it in the cover image, however, these methods was at the cost of reducing the quality of the audio signal. In this paper, a Slantlet transform (SLT) based method is applied to obtain better performance in terms of audio quality. In addition, the data hiding scheme in the cover color image has been imple
... Show MoreIn this paper we introduce a brief review about Box-Jenkins models. The acronym ARIMA stands for “autoregressive integrated moving averageâ€. It is a good method to forecast for stationary and non stationary time series. According to the data which obtained from Baghdad Water Authority, we are modelling two series, the first one about pure water consumption and the second about the number of participants. Then we determine an optimal model by depending on choosing minimum MSE as criterion.
Content-based image retrieval has been keenly developed in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval becomes one of the liveliest researches in the past few years. In a given set of objects, the retrieval of information suggests solutions to search for those in response to a particular description. The set of objects which can be considered are documents, images, videos, or sounds. This paper proposes a method to retrieve a multi-view face from a large face database according to color and texture attributes. Some of the features used for retrieval are color attributes such as the mean, the variance, and the color image's bitmap. In add
... Show MoreThe strong cryptography employed by PGP (Pretty Good Privacy) is one of the best available today. The PGP protocol is a hybrid cryptosystem that combines some of the best features of both conventional and public-key cryptography. This paper aim to improve PGP protocol by combined between the Random Genetic algorithm, NTRU (N-th degree Truncated polynomial Ring Unit) algorithm with PGP protocol stages in order to increase PGP protocol speed, security, and make it more difficult in front of the counterfeiter. This can be achieved by use the Genetic algorithm that only generates the keys according to the Random Genetic equations. The final keys that obtained from Genetic algorithm were observed to be purely random (according to the randomne
... Show MoreDrilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.
Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.
This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.
The experim
... Show MoreAnalytical field target function has been considered to represent the axial magnetic field distribution of double polepiece symmetric magnetic lens. In this article, with aid of the proposed target function, the syntheses procedure is dependent. The effect of the main two coffectin optimization parameters on the lens field distribution, polepieces shape, and the objective focal prosperities for lenses operated under zero magnification mode has been studied. The results have shown that the objective properties evaluated in sense of the inverse design procedure are in an excellent correspondence with that of analysis approach. Where the optical properties enhance as the field distribution of the electron lens distributed along a narrow axi
... Show MoreDiabetic retinopathy is an eye disease, because of pressure in eye nerve fiber. It is a major cause of blindness in middle as well as older age groups; therefore it is essential to diagnose it earlier. Some of the challenges are in the diagnosis of the disease is detection edges of the image, may be some important edges are missed outcome the noise around the corners.
Wherefore, in order to reduce these effects in this paper, we proposed a new technique for edge detection using traditional operators in combination with fuzzy logic based on fuzzy inference system. The results show that the proposed fuzzy edge detection technique better than of traditional techniques, where vascular are markedly detected over the original.
This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
The purpose of this study is to avoid delays and cost changes that occur in emergency reconstruction projects especially in post disaster circumstances. This study is aimed to identify the factors that affect the real construction period and the real cost of a project against the estimated period of construction and the estimated cost of the project. The case study is related to the construction projects in Iraq. Thirty projects in different areas of construction in Iraq were selected as a sample for this study. Project participants from the projects authorities provided data about the projects through a data collection distributed survey made by the authors. Mathematical data analysis was used to construct a model to predict change
... Show More