Carbon fiber reinforced polymers (CFRP) were widely used in strengthening reinforced concrete members
in the last few years, these fibers consist mainly of high strength fibers which increase the member capacity in addition to changing the mode of failure of the reinforced concrete beams. Experimental and theoretical investigations were carried to find the behavior of reinforced concrete beams strengthened by CFRP in shear and bending. The experimental work included testing of 12 beams divided into 4 groups; each group contains 3 beams. The following parameters were taken into consideration: - Concrete crushing strength. - CFRP strengthening location (shear strengthening and both shear and flexure strengthening). Reinforced beams were simply supported subjected to two point loads. Each group consists of three beams; the first beam without CFRP, the second one, is strengthened with CFRP in shear and the third is strengthened with CFRP in both flexure and shear. Four groups with different crushing strength of (12, 20, 30 and 39 MPa). The CFRP sheets are attached externally.
It was found that in beam with low crushing strength loads transfer to the CFRP at early stages while in
those of high crushing strength, CFRP contribution only starts when full strength of the beam is fulfilled. A
full bond between CFRP sheets and the concrete is assumed in the theoretical analysis. Comparison between the theoretical and the experimental results revealed the validity of the numerical analysis and the developed methods such that there was a difference of 13% in the ultimate strength for the tested and analyzed beams.
Objective: To assess of Science Teachers' Awareness towards Communicable Diseases Control in Baghdad City
Primary Schools
Methodology: A descriptive study was conducted, included (100) primary school, (50) in Al-Rassafa sector, and
(50) in Al-Karkh sector, from March 5th 2012 to March 15th 2013, to assess of science teachers' awareness
towards communicable diseases control. A cluster sample of (100) Science teachers (males and females) were
selected, as one teacher from each school. A questionnaire format was used for data collection. The validity of
questionnaire was estimated through a penal of experts related to the field of study, and its reliability was
estimated through a pilot study conducted in (20) schools (
In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreAfter the information revolution that occurred in the Western world, and the developments in all fields, especially in the field of education and e-learning, from an integrated system based on the effective employment of information and communication technology in the teaching and learning processes through an environment rich in computer and Internet applications, the community and the learner were able to access information sources and learning at any time and place, in a way that achieves mutual interaction between the elements of the system and the surrounding environment. After the occurrence of the phenomenon of Covid 19, it led to a major interruption in all educational systems that had never happened before, and the disrupt
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreBackground: As acetaminophen (APAP) toxicity has become more common in many countries, related cases of poisoning, whether deliberate or unintentional, have been identified as a key contributor to acute liver failure. Aime: To discover if omega-369 fatty acids could protect the liver of male mice from the effects of acetamiophen. Methods: Thirty-five albino male mice were allocated to one of five groups at random. Group 1 served as the "negative control" and received a single intraperitoneal injection (10 ml/kg) of normal saline on the eleventh day of the test following ten days of receiving liquid paraffin orally at a dose of 10 ml/kg. The liquid paraffin was given to group 2 "positive control". Group 3 received Omega 369 (50 mg/kg
... Show More