This paper presents the non-linear finite element method to study the behavior of four reinforced rectangular concrete MD beams with web circular openings tested under two-point load. The numerical finite elements methods have been used in a much more practical way to achieve approximate solutions for more complex problems. The ABAQUS /CAE is chosen to explore the behavior of MD beams. This paper also studies, the effect of both size and shape of the circular apertures of MD beams. The strengthening technique that used in this paper is externally strengthening using CFRP around the opening in the MD beams. The numerical results were compared to the experimental results in terms of ultimate load failure and displacement. The FE results showed a good agreement with experimental results.
The newly synthesized Schiff base ligand (E)-2-((2-phenylhydrazono)methyl)naphthalen-1-ol (phenyl hydrazine derivative), is allowed to react with each of the next mineral ion: Ni2+, Cu2+, Zn2+andCd2+successfully resulting to obtain new metal complexes with different geometric shape. The formation of Schiff base complexes and also the origin Schiff base is indicated using LC-Mass that manifest the obtained molar mass, FT-IR proved the occurrence of coordination through N of azobenzene and O of OH by observing the shifting in azomethines band and appearing of M-N and N-O bands. Moreover, we can also detect by such apparatus, the presence of aquatic water molecule inside the coordination sphere. UV-Vis spectra of all resultants reveale
... Show MoreIslamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
It is known that the Sunnah commanded to follow is the
Abstract
Bivariate time series modeling and forecasting have become a promising field of applied studies in recent times. For this purpose, the Linear Autoregressive Moving Average with exogenous variable ARMAX model is the most widely used technique over the past few years in modeling and forecasting this type of data. The most important assumptions of this model are linearity and homogenous for random error variance of the appropriate model. In practice, these two assumptions are often violated, so the Generalized Autoregressive Conditional Heteroscedasticity (ARCH) and (GARCH) with exogenous varia
... Show MoreRegular sampling for six months from January to July 2012 were taken in small, shallow, perennial, standing ponds near the Greater Zab River, Gwer district, Erbil. A variety of physicochemical parameters were determined. Air and water temperature were falling between 15.2 - 34.7 ? C and 15.5 and 26.5 ?C. The waters are neutral (pH 7.38-8.27), hard, alkaline, salty, high in TDS and EC (892-966?S/cm, and rich in nutrients (NO3: 2.1-4.1mg/l, PO4: 0.33-0.62 mg / l , SO4: 24.7-80.2 mg / l ). The attention fixed on a filamentous blue- green algae Glaucospira Lagerheim, 1982) which is new to Iraqi flora. It is a filament (trichome), solitary, pale or yellowish blue – green, without sheath, Screw like coiled, motile, some of them are activ
... Show MoreMO Khudhair, 2020
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreIf the State attaches great importance to its foreign relations and intends to strengthen them in order to ensure the achievement of the highest national goals and interests. External relations between countries are one of the most prominent features of foreign policy, which depends on a combination of internal and external factors, the modern relations between Tunisia and Tunisia, which goes back to the pre-independence of Tunisia, when Iraq was a supporter of Tunisia's independence from France in the 1940s, Although these relations did not cause any disturbance by the two countries, but they remained weak relations did not develop in all areas except the sports and cultural field, which we will determine the reasons and the pos
... Show MoreThe wastewater arising from pulp and paper mills is highly polluted and has to be treated before discharged into rivers. Coagulation-flocculation process using natural polymers has grown rapidly in wastewater treatment. In this work, the performance of alum and Polyaluminum Chloride (PACl) when used alone and when coupled with Fenugreek mucilage on the treatment of pulp and paper mill wastewater were studied. The experiments were carried out in jar tests with alum, PACl and Fenugreek mucilage dosages range of 50-2000 mg/L, rapid mixing at 200 rpm for 2 min, followed by slow mixing at 40 rpm for 15 min and settling time of 30 min. The effectiveness of Fenugreek mucilage was measured by the reduction of turbidity and Chemical Oxygen Demand
... Show MoreWithin the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo
... Show More