This study aimed at evaluating the torsional capacity of reinforced concrete (RC) beams externally wrapped with fiber reinforced polymer (FRP) materials. An analytical model was described and used as a new computational procedure based on the softened truss model (STM) to predict the torsional behavior of RC beams strengthened with FRP. The proposed analytical model was validated with the existing experimental data for rectangular sections strengthened with FRP materials and considering torque-twist relationship and crack pattern at failure. The confined concrete behavior, in the case of FRP wrapping, was considered in the constitutive laws of concrete in the model. Then, an efficient algorithm was developed in MATLAB environment to accomplish the analysis, solve the appropriate equations, and calculate the torsional moment and angle of twist at all points. The parametric study considered the effect of effective fiber strain to reach a better prediction for the full torsional behavior. The model was able to predict the torsional behavior of the RC beams strengthened with FRP materials before and after cracking stages with reasonable accuracy.
In this research a computational simulation has been carried out on the design and properties of the electrostatic mirror and a mathematical expression has been suggested to represent the axial potential of an electrostatic mirror. The electron beam path using the Bimurzaev technique had been investigated as mirror trajectory with the aid of Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements. The Electrode shape of mirror two electrodes has been determined by using package SIMION computer program. Computations have shown that the suggested potentials giv
... Show MoreThis study aims to determine the prevalence of Entamoeba histolytica, Entamoeba dispar and
Entamoeba moshkovskii by three methods of diagnosis (microscopic examination, cultivation and PCR) that
were compared to obtain an accurate diagnosis of Entamoeba spp. during amoebiasis. Total (n=150) stool
samples related to patients were (n = 100) and healthy controls (n= 50). Clinically diagnosed stool samples
(n=100) were collected from patients attending the consultant clinics of different hospitals in Basrah during
the period from January 2018 to January 2019. The results showed that 60% of collected samples were
positive in a direct microscopic examination. All samples were cultivated on different media; the Bra
Iraq territory as a whole and south of Iraq in particular encountered rapid desertification and signs of severe land degradation in the last decades. Both natural and anthropogenic factors are responsible for the extent of desertification. Remote sensing data and image analysis tools were employed to identify, detect, and monitor desertification in Basra governorate. Different remote sensing indicators and image indices were applied in order to better identify the desertification development in the study area, including the Normalized difference vegetation index (NDVI), Normalized Difference Water Index (NDWI), Salinity index (SI), Top Soil Grain Size Index (GSI) , Land Surface Temperature (LST) , Land Surface Soil Moisture (LSM), and La
... Show MoreMany conservative sphincter-preserving procedures had been described to be effective in
healing of anal fistula without excision or de roofing.
Objective: To verify the outcome of mere photocoagulation of the fistula tract on healing of low anal
fistula.
Materials and Methods: Using 810nm diode laser, the tracts of low anal fistulae in a cohorts of six male
patients (mean age of 32 yr) had been photocoagulated by retrograde application of laser light through an
orb tip optical fiber threaded in to the tract. Swabs for culture and sensitivity testing were obtained before
and after laser application. Patients were followed up regularly to announce fistula healing.
Results: Mean laser exposure time was 6.6 min., mean
The designer must find the optimum match between the object's technical and economic needs and the performance and production requirements of the various material options when choosing material for an engineering application. This study proposes an integrated (hybrid) strategy for selecting the optimal material for an engineering design depending on design requirements. The primary objective is to determine the best candidate material for the drone wings based on Ashby's performance indices and then rank the result using a grey relational technique with the entropy weight method. Aluminum alloys, titanium alloys, composites, and wood have been suggested as suitable materials for manufacturing drone wings. The requirement
... Show MoreHome New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreRecently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show More