Pushover analysis is an efficient method for the seismic evaluation of buildings under severe earthquakes. This paper aims to develop and verify the pushover analysis methodology for reinforced concrete frames. This technique depends on a nonlinear representation of the structure by using SAP2000 software. The properties of plastic hinges will be defined by generating the moment-curvature analysis for all the frame sections (beams and columns). The verification of the technique above was compared with the previous study for two-dimensional frames (4-and 7-story frames). The former study leaned on automatic identification of positive and negative moments, where the concrete sections and steel reinforcement quantities the source of these moments. The comparison of the results between the two methodologies was carried out in terms of capacity curves. The results of the conducted comparison highlighted essential points. It was included the potential differences between default and user-defined hinge properties in modeling. The effect of the plastic hinge length and the transverse of shear reinforcement on the capacity curves was also observed. Accordingly, it can be considered that the current methodology in this paper more logistic in the representation of two and three-dimensional structures.
Therapeutic contact lenses TCLs is an approach used to enhance corneal residence time and reduce frequent instillation, which is a problem with eye drops. The problem with CLs is loading of hydrophobic drugs. In this research the CLs were prepared with molecular imprinting MI to enhance the loading of itraconazole, which is used as antifungal drug for fungal keratitis. CLs using different concentration of hydroxyethyl methacrylate HEMA and methacrylic acid MAA were prepared with and without MI using PEGDA (25 μL) and AIBN (37 mg) as crosslinker and initiator respectively. All the prepared CLs were clear and have good folding endurance. MICLs had significantly higher drug loading compared to conventional CLs. The release of i
... Show MoreBackground:
The area around the Suez Canal has been chosen particularly Sinai to implement the new Suez Canal project parallel to the original 72-km-long channel due to the importance of the commercial site of the Arab Republic of Egypt, competing with shipping lanes, to accommodate the increasing maritime traffic passing through the Suez canal, and to provide special services for trade world and reduce the economic cost of marine trip. The establishment of six tunnels for automobile and railway transport to Sinai The cost of the establishment of this new channel and the establishment of the tunnels about (2.8) billion, of which 4 billion cost of the new channel. Project implementation period is one year. The new proj
... Show MoreNowadays laser in medicine is a rapidly growing field in both researches and applications and many studies have been done in bacteriology against different types of lasers. The effect of the laser depends on many factors, one of the laser factors was the wavelength. The red wavelength band has been considered as a stimulated wavelength for prokaryotic and eukaryotic cells. In this study, three clinical species of Gram-negative bacteria (E. coli, Proteus mirabilis, and Pseudomonas aeruginosa) were exposed to 650 nm band of red region wavelength by a diode laser. The effect of that wavelength appeared on the growth curves for each species along 3 days after laser treatment. The energy density (E.D.) 2.8 J/cm2 gave a positive effect on grow
... Show MoreFor criminal investigations, fingerprints remain the most reliable form of personal identification despite developments in other fields like DNA profiling. The objective of this work is to compare the performance of both commercial charcoal and activated carbon powder derived from the Alhagi plant to reveal latent fingerprints from different non-porous surfaces (cardboard, plain glass, aluminum foil sheet, China Dish, Plastic, and Switch). The effect of three variables on activated carbon production was investigated. These variables were the impregnation ratio (the weight ratio of KOH: dried raw material), the activation temperature, and the activation time. The effect factors were investigated using Central Composite Design (CCD) softwa
... Show MoreAbstract:
The research concerned the study of the railway transport sector in selected countries that sought to raise the efficiency of the railway network and develop it, after realizing the importance of this vital sector, which is a link between it and the rest of the other economic sectors.
The research sought to explain the methods, methods and procedures adopted by these countries for the development of the railway sector, and to benefit from these experiments to improve the efficiency of the railway transport sector in Iraq.
The railway transport sector in Iraq suffers from the erosion of railway lines and mobile units such as locomotives, pas
... Show More
For criminal investigations, fingerprints remain the most reliable form of personal identification despite developments in other fields like DNA profiling. The objective of this work is to compare the performance of both commercial charcoal and activated carbon powder derived from the Alhagi plant to reveal latent fingerprints from different non-porous surfaces (cardboard, plain glass, aluminum foil sheet, China Dish, Plastic, and Switch). The effect of three variables on activated carbon production was investigated. These variables were the impregnation ratio (the weight ratio of KOH: dried raw material), the activation temperature, and the activation time. The effect factors were investigated using Central Composite Design
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
This paper describes theoretical modeling of electrostatic mirror based on two cylindrical electrodes, A computational investigation has been carried out on the design and properties of the electrostatic mirror. we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The beam path by using the Bimurzaev technique have been investigated as a mirror trajectory with the aid of Runge – Kutta method. the electrode shape of mirror two electrode has been determined by using package SIMION computer program . The spherical and chromatic aberrations coefficients of mirror has been computed and normalized in terms of the focal length. The choice of the mirror depends on the op
... Show More