Carbon fiber reinforced polymers (CFRP) were widely used in strengthening reinforced concrete members
in the last few years, these fibers consist mainly of high strength fibers which increase the member capacity in addition to changing the mode of failure of the reinforced concrete beams. Experimental and theoretical investigations were carried to find the behavior of reinforced concrete beams strengthened by CFRP in shear and bending. The experimental work included testing of 12 beams divided into 4 groups; each group contains 3 beams. The following parameters were taken into consideration: - Concrete crushing strength. - CFRP strengthening location (shear strengthening and both shear and flexure strengthening). Reinforced beams were simply supported subjected to two point loads. Each group consists of three beams; the first beam without CFRP, the second one, is strengthened with CFRP in shear and the third is strengthened with CFRP in both flexure and shear. Four groups with different crushing strength of (12, 20, 30 and 39 MPa). The CFRP sheets are attached externally.
It was found that in beam with low crushing strength loads transfer to the CFRP at early stages while in
those of high crushing strength, CFRP contribution only starts when full strength of the beam is fulfilled. A
full bond between CFRP sheets and the concrete is assumed in the theoretical analysis. Comparison between the theoretical and the experimental results revealed the validity of the numerical analysis and the developed methods such that there was a difference of 13% in the ultimate strength for the tested and analyzed beams.
zine level in serum was mesured from patients suffering ftom cancer and healthy indiciduals hindred from each individuals were classified into three according to thier age the groups were
Histologic changes were studied and physiological dosage crude alcoholic extract of seeds of the fenugreek plant for male mice eggs in different concentrations after oral to study testicular tissue and culverts where reason Abstract significant decrease
Contemporary developments in various sciences and the impact of technological changes require an integrated vision of the activities and work of the organization in Iraq in light of the high costs of products and their low quality compared to imported products of high quality and low cost, and the need to use modern cost techniques based on a clear and specific philosophy that contributes to increasing the efficiency and effectiveness of management In the business environment and how it can contribute to reducing product costs and being environmentally friendly at the same time, it is no secret that the main goal of most organizations is to maximize profitability and reduce costs to the minimum, but this matter is not achieved autom
... Show MoreSubjects took physical fitness for health imposed on the area of research that have become an important and clear answer to the many problems resulting from the nature of dealing with modern life current actions that were needed to be hours of manual work has become accomplished by modern technology circumstance minutes, and mediated equipment And machinery. The lack of traffic rights and further burdens the intellectual and psychological pressures and the typical method of work has led to the identification of kinetic activity, thereby threatening public health in many ways stands at the forefront of these threats the problem of smoking, which causes many types of cancers, notably lung cancer. The most important reasons that led to This dr
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More